Compare commits
100 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
9ca522ba15 | ||
|
3005ff4237 | ||
|
d3bcf7e60e | ||
|
85f3fc6654 | ||
|
88f5720e16 | ||
|
27585e73da | ||
|
42a443d5cd | ||
|
c466cc2ca5 | ||
|
5c49aca613 | ||
|
99891bd41e | ||
|
3485d55709 | ||
|
c1a7127e01 | ||
|
2f21eddfb8 | ||
|
860c29c923 | ||
|
8cfead2839 | ||
|
30f6b2f3c7 | ||
|
4de32568fa | ||
|
ff91020528 | ||
|
943773983d | ||
|
e91ea5561d | ||
|
5e86b202de | ||
|
b764882195 | ||
|
a2abc5e15f | ||
|
a618e43977 | ||
|
bbc04972bc | ||
|
61a7f360d9 | ||
|
fc1c47ccad | ||
|
fec64b04eb | ||
|
05aa27ef23 | ||
|
06cc698885 | ||
|
cb870a1ce9 | ||
|
90e04a7e31 | ||
|
1d01d2a9a7 | ||
|
70e9b22f5c | ||
|
e9d6369050 | ||
|
58d6aae969 | ||
|
4e0fcaba18 | ||
|
2d04a62512 | ||
|
8a0955dfa8 | ||
|
06f4583ea5 | ||
|
9daa69a59e | ||
|
9030464a1b | ||
|
bcfe7a54aa | ||
|
600c565eb2 | ||
|
aae506ce44 | ||
|
bf2ca74bb6 | ||
|
654e5958cd | ||
|
9657bbe08f | ||
|
10cbbe06d3 | ||
|
802391f1fe | ||
|
db04386fd9 | ||
|
7d5abcd016 | ||
|
d296a36cc4 | ||
|
bdb15bf9ba | ||
|
25af751320 | ||
|
7f99fae217 | ||
|
c134065066 | ||
|
eec38fd383 | ||
|
b9564773f1 | ||
|
8c767bb014 | ||
|
7386ad5ae3 | ||
|
e727453a97 | ||
|
553bda4d8e | ||
|
3e7febc83c | ||
|
b664a5352c | ||
|
b376a7d60f | ||
|
3fb944f925 | ||
|
1d70aa7a9b | ||
|
0bef9ccd43 | ||
|
d3b38ea28a | ||
|
69ae47ba5d | ||
|
95c492569f | ||
|
d996a4bc9f | ||
|
9f528fb4c0 | ||
|
bbab5b95b4 | ||
|
5e84cc0714 | ||
|
2af54dd5bd | ||
|
00283317d8 | ||
|
232f661f99 | ||
|
552ca5cc88 | ||
|
94e7cfc7e7 | ||
|
de7030ed26 | ||
|
587653cd8b | ||
|
e167ed1a3d | ||
|
003534f8f0 | ||
|
a363907bc9 | ||
|
530cc53f96 | ||
|
112268c70d | ||
|
726280b214 | ||
|
b1ab82d4c8 | ||
|
2e16857f3d | ||
|
308f9a49b0 | ||
|
7ab09015b1 | ||
|
d1c0828262 | ||
|
b4dd94c217 | ||
|
f428f538b6 | ||
|
75b91c0b9f | ||
|
9f1dd0acb1 | ||
|
6db1a5555a | ||
|
72f8b9d80b |
@ -1 +1 @@
|
||||
Subproject commit 666c3280cc11dc433c303d79a83d4ffbdd12cc8d
|
||||
Subproject commit aa7b018dcbf2e9eb8cfdc2e2cacec82b25707faa
|
@ -13,6 +13,14 @@ OBJECTS = DevicePath.o UefiDevicePathLib.o DevicePathFromText.o DevicePathUtili
|
||||
|
||||
include $(MAKEROOT)/Makefiles/app.makefile
|
||||
|
||||
GCCVERSION = $(shell gcc -dumpversion | awk -F'.' '{print $$1}')
|
||||
ifneq ("$(GCCVERSION)", "5")
|
||||
ifneq ($(CXX), llvm)
|
||||
# gcc 12 trips over device path handling
|
||||
BUILD_CFLAGS += -Wno-error=stringop-overflow
|
||||
endif
|
||||
endif
|
||||
|
||||
LIBS = -lCommon
|
||||
ifeq ($(CYGWIN), CYGWIN)
|
||||
LIBS += -L/lib/e2fsprogs -luuid
|
||||
|
@ -542,7 +542,7 @@ GetAlignmentFromFile(char *InFile, UINT32 *Alignment)
|
||||
PeFileBuffer = (UINT8 *) malloc (PeFileSize);
|
||||
if (PeFileBuffer == NULL) {
|
||||
fclose (InFileHandle);
|
||||
Error(NULL, 0, 4001, "Resource", "memory cannot be allocated of %s", InFileHandle);
|
||||
Error(NULL, 0, 4001, "Resource", "memory cannot be allocated for %s", InFile);
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
fread (PeFileBuffer, sizeof (UINT8), PeFileSize, InFileHandle);
|
||||
|
@ -1062,7 +1062,7 @@ GetAlignmentFromFile(char *InFile, UINT32 *Alignment)
|
||||
PeFileBuffer = (UINT8 *) malloc (PeFileSize);
|
||||
if (PeFileBuffer == NULL) {
|
||||
fclose (InFileHandle);
|
||||
Error(NULL, 0, 4001, "Resource", "memory cannot be allocated of %s", InFileHandle);
|
||||
Error(NULL, 0, 4001, "Resource", "memory cannot be allocated for %s", InFile);
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
fread (PeFileBuffer, sizeof (UINT8), PeFileSize, InFileHandle);
|
||||
|
@ -2825,12 +2825,13 @@ SRes LzmaEnc_CodeOneMemBlock(CLzmaEncHandle pp, BoolInt reInit,
|
||||
|
||||
nowPos64 = p->nowPos64;
|
||||
RangeEnc_Init(&p->rc);
|
||||
p->rc.outStream = &outStream.vt;
|
||||
|
||||
if (desiredPackSize == 0)
|
||||
return SZ_ERROR_OUTPUT_EOF;
|
||||
|
||||
p->rc.outStream = &outStream.vt;
|
||||
res = LzmaEnc_CodeOneBlock(p, desiredPackSize, *unpackSize);
|
||||
p->rc.outStream = NULL;
|
||||
|
||||
*unpackSize = (UInt32)(p->nowPos64 - nowPos64);
|
||||
*destLen -= outStream.rem;
|
||||
|
@ -152,11 +152,11 @@ class CompressedImage(Image):
|
||||
try:
|
||||
TmpData = DeCompress('Efi', self[self._HEADER_SIZE_:])
|
||||
DecData = array('B')
|
||||
DecData.fromstring(TmpData)
|
||||
DecData.frombytes(TmpData)
|
||||
except:
|
||||
TmpData = DeCompress('Framework', self[self._HEADER_SIZE_:])
|
||||
DecData = array('B')
|
||||
DecData.fromstring(TmpData)
|
||||
DecData.frombytes(TmpData)
|
||||
|
||||
SectionList = []
|
||||
Offset = 0
|
||||
@ -196,7 +196,7 @@ class Ui(Image):
|
||||
return len(self)
|
||||
|
||||
def _GetUiString(self):
|
||||
return codecs.utf_16_decode(self[0:-2].tostring())[0]
|
||||
return codecs.utf_16_decode(self[0:-2].tobytes())[0]
|
||||
|
||||
String = property(_GetUiString)
|
||||
|
||||
@ -738,7 +738,7 @@ class GuidDefinedImage(Image):
|
||||
Offset = self.DataOffset - 4
|
||||
TmpData = DeCompress('Framework', self[self.Offset:])
|
||||
DecData = array('B')
|
||||
DecData.fromstring(TmpData)
|
||||
DecData.frombytes(TmpData)
|
||||
Offset = 0
|
||||
while Offset < len(DecData):
|
||||
Sec = Section()
|
||||
@ -759,7 +759,7 @@ class GuidDefinedImage(Image):
|
||||
|
||||
TmpData = DeCompress('Lzma', self[self.Offset:])
|
||||
DecData = array('B')
|
||||
DecData.fromstring(TmpData)
|
||||
DecData.frombytes(TmpData)
|
||||
Offset = 0
|
||||
while Offset < len(DecData):
|
||||
Sec = Section()
|
||||
|
@ -1 +1 @@
|
||||
Subproject commit 52c587d60be67c337364b830dd3fdc15404a2f04
|
||||
Subproject commit e2e09d9fba1187f8d6aafaa34d4172f56f1ffb72
|
47
FSDrivers/IA32/LICENSE.txt
Normal file
47
FSDrivers/IA32/LICENSE.txt
Normal file
@ -0,0 +1,47 @@
|
||||
Licensing for the filesystem drivers is complex. Three different licenses
|
||||
apply to various parts of the code:
|
||||
|
||||
* Christoph Pfisterer's original file system wrapper (FSW) code is covered
|
||||
by a BSD-style license. Many of the source files with names that take the
|
||||
form fsw_*.[ch] are so licensed, but this is NOT generally true of
|
||||
filesystem-specific files (e.g., fsw_ext2.c or fsw_btrfs.c).
|
||||
|
||||
* Certain filesystem drivers are licensed under the GPLv2, either because
|
||||
they borrow code from the Linux kernel or because a developer (typically
|
||||
Oracle) applied the GPLv2 license to them. This is true of the ext2fs,
|
||||
ext4fs, ReiserFS, HFS+, and ISO-9660 drivers.
|
||||
|
||||
* At least one filesystem driver (Btrfs) uses code taken from GRUB, and so
|
||||
uses the GPLv3 (or later) license.
|
||||
|
||||
Note that the GPLv2 and GPLv3 are, ironically, not compatible licenses.
|
||||
Thus, code from GPLv2 and GPLv3 projects should not be mixed. The BSD
|
||||
license used by Pfisterer's original code is compatible with both versions
|
||||
of the GPL, so the fact that both GPLv2 and GPLv3 drivers is built upon it
|
||||
is OK. If you intend to contribute to this project's drivers or use the
|
||||
code yourself, please keep this fact in mind.
|
||||
|
||||
The below was written by Christoph Pfisterer with respect to his original
|
||||
code:
|
||||
|
||||
File System Wrapper License
|
||||
=============================
|
||||
|
||||
The various parts of the File System Wrapper source code come from
|
||||
different sources and may carry different licenses. Here's a quick
|
||||
account of the situation:
|
||||
|
||||
* The core code was written from scratch and is covered by a
|
||||
BSD-style license.
|
||||
|
||||
* The EFI host driver was written from scratch, possibly using code
|
||||
from the TianoCore project and Intel's EFI Application Toolkit. It
|
||||
is covered by a BSD-style license.
|
||||
|
||||
* The ext2 and reiserfs file system drivers use definitions from the
|
||||
Linux kernel source. The actual code was written from scratch,
|
||||
using multiple sources for reference. These drivers are covered by
|
||||
the GNU GPL.
|
||||
|
||||
For more details, see each file's boilerplate comment. The full text
|
||||
of the GNU GPL is in the file LICENSE_GPL.txt.
|
340
FSDrivers/IA32/LICENSE_GPL.txt
Normal file
340
FSDrivers/IA32/LICENSE_GPL.txt
Normal file
@ -0,0 +1,340 @@
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 2, June 1991
|
||||
|
||||
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
|
||||
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The licenses for most software are designed to take away your
|
||||
freedom to share and change it. By contrast, the GNU General Public
|
||||
License is intended to guarantee your freedom to share and change free
|
||||
software--to make sure the software is free for all its users. This
|
||||
General Public License applies to most of the Free Software
|
||||
Foundation's software and to any other program whose authors commit to
|
||||
using it. (Some other Free Software Foundation software is covered by
|
||||
the GNU Library General Public License instead.) You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
this service if you wish), that you receive source code or can get it
|
||||
if you want it, that you can change the software or use pieces of it
|
||||
in new free programs; and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to make restrictions that forbid
|
||||
anyone to deny you these rights or to ask you to surrender the rights.
|
||||
These restrictions translate to certain responsibilities for you if you
|
||||
distribute copies of the software, or if you modify it.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must give the recipients all the rights that
|
||||
you have. You must make sure that they, too, receive or can get the
|
||||
source code. And you must show them these terms so they know their
|
||||
rights.
|
||||
|
||||
We protect your rights with two steps: (1) copyright the software, and
|
||||
(2) offer you this license which gives you legal permission to copy,
|
||||
distribute and/or modify the software.
|
||||
|
||||
Also, for each author's protection and ours, we want to make certain
|
||||
that everyone understands that there is no warranty for this free
|
||||
software. If the software is modified by someone else and passed on, we
|
||||
want its recipients to know that what they have is not the original, so
|
||||
that any problems introduced by others will not reflect on the original
|
||||
authors' reputations.
|
||||
|
||||
Finally, any free program is threatened constantly by software
|
||||
patents. We wish to avoid the danger that redistributors of a free
|
||||
program will individually obtain patent licenses, in effect making the
|
||||
program proprietary. To prevent this, we have made it clear that any
|
||||
patent must be licensed for everyone's free use or not licensed at all.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
||||
|
||||
0. This License applies to any program or other work which contains
|
||||
a notice placed by the copyright holder saying it may be distributed
|
||||
under the terms of this General Public License. The "Program", below,
|
||||
refers to any such program or work, and a "work based on the Program"
|
||||
means either the Program or any derivative work under copyright law:
|
||||
that is to say, a work containing the Program or a portion of it,
|
||||
either verbatim or with modifications and/or translated into another
|
||||
language. (Hereinafter, translation is included without limitation in
|
||||
the term "modification".) Each licensee is addressed as "you".
|
||||
|
||||
Activities other than copying, distribution and modification are not
|
||||
covered by this License; they are outside its scope. The act of
|
||||
running the Program is not restricted, and the output from the Program
|
||||
is covered only if its contents constitute a work based on the
|
||||
Program (independent of having been made by running the Program).
|
||||
Whether that is true depends on what the Program does.
|
||||
|
||||
1. You may copy and distribute verbatim copies of the Program's
|
||||
source code as you receive it, in any medium, provided that you
|
||||
conspicuously and appropriately publish on each copy an appropriate
|
||||
copyright notice and disclaimer of warranty; keep intact all the
|
||||
notices that refer to this License and to the absence of any warranty;
|
||||
and give any other recipients of the Program a copy of this License
|
||||
along with the Program.
|
||||
|
||||
You may charge a fee for the physical act of transferring a copy, and
|
||||
you may at your option offer warranty protection in exchange for a fee.
|
||||
|
||||
2. You may modify your copy or copies of the Program or any portion
|
||||
of it, thus forming a work based on the Program, and copy and
|
||||
distribute such modifications or work under the terms of Section 1
|
||||
above, provided that you also meet all of these conditions:
|
||||
|
||||
a) You must cause the modified files to carry prominent notices
|
||||
stating that you changed the files and the date of any change.
|
||||
|
||||
b) You must cause any work that you distribute or publish, that in
|
||||
whole or in part contains or is derived from the Program or any
|
||||
part thereof, to be licensed as a whole at no charge to all third
|
||||
parties under the terms of this License.
|
||||
|
||||
c) If the modified program normally reads commands interactively
|
||||
when run, you must cause it, when started running for such
|
||||
interactive use in the most ordinary way, to print or display an
|
||||
announcement including an appropriate copyright notice and a
|
||||
notice that there is no warranty (or else, saying that you provide
|
||||
a warranty) and that users may redistribute the program under
|
||||
these conditions, and telling the user how to view a copy of this
|
||||
License. (Exception: if the Program itself is interactive but
|
||||
does not normally print such an announcement, your work based on
|
||||
the Program is not required to print an announcement.)
|
||||
|
||||
These requirements apply to the modified work as a whole. If
|
||||
identifiable sections of that work are not derived from the Program,
|
||||
and can be reasonably considered independent and separate works in
|
||||
themselves, then this License, and its terms, do not apply to those
|
||||
sections when you distribute them as separate works. But when you
|
||||
distribute the same sections as part of a whole which is a work based
|
||||
on the Program, the distribution of the whole must be on the terms of
|
||||
this License, whose permissions for other licensees extend to the
|
||||
entire whole, and thus to each and every part regardless of who wrote it.
|
||||
|
||||
Thus, it is not the intent of this section to claim rights or contest
|
||||
your rights to work written entirely by you; rather, the intent is to
|
||||
exercise the right to control the distribution of derivative or
|
||||
collective works based on the Program.
|
||||
|
||||
In addition, mere aggregation of another work not based on the Program
|
||||
with the Program (or with a work based on the Program) on a volume of
|
||||
a storage or distribution medium does not bring the other work under
|
||||
the scope of this License.
|
||||
|
||||
3. You may copy and distribute the Program (or a work based on it,
|
||||
under Section 2) in object code or executable form under the terms of
|
||||
Sections 1 and 2 above provided that you also do one of the following:
|
||||
|
||||
a) Accompany it with the complete corresponding machine-readable
|
||||
source code, which must be distributed under the terms of Sections
|
||||
1 and 2 above on a medium customarily used for software interchange; or,
|
||||
|
||||
b) Accompany it with a written offer, valid for at least three
|
||||
years, to give any third party, for a charge no more than your
|
||||
cost of physically performing source distribution, a complete
|
||||
machine-readable copy of the corresponding source code, to be
|
||||
distributed under the terms of Sections 1 and 2 above on a medium
|
||||
customarily used for software interchange; or,
|
||||
|
||||
c) Accompany it with the information you received as to the offer
|
||||
to distribute corresponding source code. (This alternative is
|
||||
allowed only for noncommercial distribution and only if you
|
||||
received the program in object code or executable form with such
|
||||
an offer, in accord with Subsection b above.)
|
||||
|
||||
The source code for a work means the preferred form of the work for
|
||||
making modifications to it. For an executable work, complete source
|
||||
code means all the source code for all modules it contains, plus any
|
||||
associated interface definition files, plus the scripts used to
|
||||
control compilation and installation of the executable. However, as a
|
||||
special exception, the source code distributed need not include
|
||||
anything that is normally distributed (in either source or binary
|
||||
form) with the major components (compiler, kernel, and so on) of the
|
||||
operating system on which the executable runs, unless that component
|
||||
itself accompanies the executable.
|
||||
|
||||
If distribution of executable or object code is made by offering
|
||||
access to copy from a designated place, then offering equivalent
|
||||
access to copy the source code from the same place counts as
|
||||
distribution of the source code, even though third parties are not
|
||||
compelled to copy the source along with the object code.
|
||||
|
||||
4. You may not copy, modify, sublicense, or distribute the Program
|
||||
except as expressly provided under this License. Any attempt
|
||||
otherwise to copy, modify, sublicense or distribute the Program is
|
||||
void, and will automatically terminate your rights under this License.
|
||||
However, parties who have received copies, or rights, from you under
|
||||
this License will not have their licenses terminated so long as such
|
||||
parties remain in full compliance.
|
||||
|
||||
5. You are not required to accept this License, since you have not
|
||||
signed it. However, nothing else grants you permission to modify or
|
||||
distribute the Program or its derivative works. These actions are
|
||||
prohibited by law if you do not accept this License. Therefore, by
|
||||
modifying or distributing the Program (or any work based on the
|
||||
Program), you indicate your acceptance of this License to do so, and
|
||||
all its terms and conditions for copying, distributing or modifying
|
||||
the Program or works based on it.
|
||||
|
||||
6. Each time you redistribute the Program (or any work based on the
|
||||
Program), the recipient automatically receives a license from the
|
||||
original licensor to copy, distribute or modify the Program subject to
|
||||
these terms and conditions. You may not impose any further
|
||||
restrictions on the recipients' exercise of the rights granted herein.
|
||||
You are not responsible for enforcing compliance by third parties to
|
||||
this License.
|
||||
|
||||
7. If, as a consequence of a court judgment or allegation of patent
|
||||
infringement or for any other reason (not limited to patent issues),
|
||||
conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot
|
||||
distribute so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you
|
||||
may not distribute the Program at all. For example, if a patent
|
||||
license would not permit royalty-free redistribution of the Program by
|
||||
all those who receive copies directly or indirectly through you, then
|
||||
the only way you could satisfy both it and this License would be to
|
||||
refrain entirely from distribution of the Program.
|
||||
|
||||
If any portion of this section is held invalid or unenforceable under
|
||||
any particular circumstance, the balance of the section is intended to
|
||||
apply and the section as a whole is intended to apply in other
|
||||
circumstances.
|
||||
|
||||
It is not the purpose of this section to induce you to infringe any
|
||||
patents or other property right claims or to contest validity of any
|
||||
such claims; this section has the sole purpose of protecting the
|
||||
integrity of the free software distribution system, which is
|
||||
implemented by public license practices. Many people have made
|
||||
generous contributions to the wide range of software distributed
|
||||
through that system in reliance on consistent application of that
|
||||
system; it is up to the author/donor to decide if he or she is willing
|
||||
to distribute software through any other system and a licensee cannot
|
||||
impose that choice.
|
||||
|
||||
This section is intended to make thoroughly clear what is believed to
|
||||
be a consequence of the rest of this License.
|
||||
|
||||
8. If the distribution and/or use of the Program is restricted in
|
||||
certain countries either by patents or by copyrighted interfaces, the
|
||||
original copyright holder who places the Program under this License
|
||||
may add an explicit geographical distribution limitation excluding
|
||||
those countries, so that distribution is permitted only in or among
|
||||
countries not thus excluded. In such case, this License incorporates
|
||||
the limitation as if written in the body of this License.
|
||||
|
||||
9. The Free Software Foundation may publish revised and/or new versions
|
||||
of the General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the Program
|
||||
specifies a version number of this License which applies to it and "any
|
||||
later version", you have the option of following the terms and conditions
|
||||
either of that version or of any later version published by the Free
|
||||
Software Foundation. If the Program does not specify a version number of
|
||||
this License, you may choose any version ever published by the Free Software
|
||||
Foundation.
|
||||
|
||||
10. If you wish to incorporate parts of the Program into other free
|
||||
programs whose distribution conditions are different, write to the author
|
||||
to ask for permission. For software which is copyrighted by the Free
|
||||
Software Foundation, write to the Free Software Foundation; we sometimes
|
||||
make exceptions for this. Our decision will be guided by the two goals
|
||||
of preserving the free status of all derivatives of our free software and
|
||||
of promoting the sharing and reuse of software generally.
|
||||
|
||||
NO WARRANTY
|
||||
|
||||
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
||||
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
||||
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
||||
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
||||
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
||||
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
||||
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
||||
REPAIR OR CORRECTION.
|
||||
|
||||
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
||||
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
||||
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
||||
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
||||
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
||||
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
||||
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
||||
POSSIBILITY OF SUCH DAMAGES.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
convey the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
<one line to give the program's name and a brief idea of what it does.>
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This program is free software; you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation; either version 2 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program is interactive, make it output a short notice like this
|
||||
when it starts in an interactive mode:
|
||||
|
||||
Gnomovision version 69, Copyright (C) year name of author
|
||||
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, the commands you use may
|
||||
be called something other than `show w' and `show c'; they could even be
|
||||
mouse-clicks or menu items--whatever suits your program.
|
||||
|
||||
You should also get your employer (if you work as a programmer) or your
|
||||
school, if any, to sign a "copyright disclaimer" for the program, if
|
||||
necessary. Here is a sample; alter the names:
|
||||
|
||||
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
|
||||
`Gnomovision' (which makes passes at compilers) written by James Hacker.
|
||||
|
||||
<signature of Ty Coon>, 1 April 1989
|
||||
Ty Coon, President of Vice
|
||||
|
||||
This General Public License does not permit incorporating your program into
|
||||
proprietary programs. If your program is a subroutine library, you may
|
||||
consider it more useful to permit linking proprietary applications with the
|
||||
library. If this is what you want to do, use the GNU Library General
|
||||
Public License instead of this License.
|
BIN
FSDrivers/IA32/exfat_ia32.efi
Normal file
BIN
FSDrivers/IA32/exfat_ia32.efi
Normal file
Binary file not shown.
BIN
FSDrivers/IA32/ext2_ia32.efi
Normal file
BIN
FSDrivers/IA32/ext2_ia32.efi
Normal file
Binary file not shown.
BIN
FSDrivers/IA32/ext4_ia32.efi
Normal file
BIN
FSDrivers/IA32/ext4_ia32.efi
Normal file
Binary file not shown.
BIN
FSDrivers/IA32/ntfs_ia32.efi
Normal file
BIN
FSDrivers/IA32/ntfs_ia32.efi
Normal file
Binary file not shown.
47
FSDrivers/X64/LICENSE.txt
Normal file
47
FSDrivers/X64/LICENSE.txt
Normal file
@ -0,0 +1,47 @@
|
||||
Licensing for the filesystem drivers is complex. Three different licenses
|
||||
apply to various parts of the code:
|
||||
|
||||
* Christoph Pfisterer's original file system wrapper (FSW) code is covered
|
||||
by a BSD-style license. Many of the source files with names that take the
|
||||
form fsw_*.[ch] are so licensed, but this is NOT generally true of
|
||||
filesystem-specific files (e.g., fsw_ext2.c or fsw_btrfs.c).
|
||||
|
||||
* Certain filesystem drivers are licensed under the GPLv2, either because
|
||||
they borrow code from the Linux kernel or because a developer (typically
|
||||
Oracle) applied the GPLv2 license to them. This is true of the ext2fs,
|
||||
ext4fs, ReiserFS, HFS+, and ISO-9660 drivers.
|
||||
|
||||
* At least one filesystem driver (Btrfs) uses code taken from GRUB, and so
|
||||
uses the GPLv3 (or later) license.
|
||||
|
||||
Note that the GPLv2 and GPLv3 are, ironically, not compatible licenses.
|
||||
Thus, code from GPLv2 and GPLv3 projects should not be mixed. The BSD
|
||||
license used by Pfisterer's original code is compatible with both versions
|
||||
of the GPL, so the fact that both GPLv2 and GPLv3 drivers is built upon it
|
||||
is OK. If you intend to contribute to this project's drivers or use the
|
||||
code yourself, please keep this fact in mind.
|
||||
|
||||
The below was written by Christoph Pfisterer with respect to his original
|
||||
code:
|
||||
|
||||
File System Wrapper License
|
||||
=============================
|
||||
|
||||
The various parts of the File System Wrapper source code come from
|
||||
different sources and may carry different licenses. Here's a quick
|
||||
account of the situation:
|
||||
|
||||
* The core code was written from scratch and is covered by a
|
||||
BSD-style license.
|
||||
|
||||
* The EFI host driver was written from scratch, possibly using code
|
||||
from the TianoCore project and Intel's EFI Application Toolkit. It
|
||||
is covered by a BSD-style license.
|
||||
|
||||
* The ext2 and reiserfs file system drivers use definitions from the
|
||||
Linux kernel source. The actual code was written from scratch,
|
||||
using multiple sources for reference. These drivers are covered by
|
||||
the GNU GPL.
|
||||
|
||||
For more details, see each file's boilerplate comment. The full text
|
||||
of the GNU GPL is in the file LICENSE_GPL.txt.
|
340
FSDrivers/X64/LICENSE_GPL.txt
Normal file
340
FSDrivers/X64/LICENSE_GPL.txt
Normal file
@ -0,0 +1,340 @@
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 2, June 1991
|
||||
|
||||
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
|
||||
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The licenses for most software are designed to take away your
|
||||
freedom to share and change it. By contrast, the GNU General Public
|
||||
License is intended to guarantee your freedom to share and change free
|
||||
software--to make sure the software is free for all its users. This
|
||||
General Public License applies to most of the Free Software
|
||||
Foundation's software and to any other program whose authors commit to
|
||||
using it. (Some other Free Software Foundation software is covered by
|
||||
the GNU Library General Public License instead.) You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
this service if you wish), that you receive source code or can get it
|
||||
if you want it, that you can change the software or use pieces of it
|
||||
in new free programs; and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to make restrictions that forbid
|
||||
anyone to deny you these rights or to ask you to surrender the rights.
|
||||
These restrictions translate to certain responsibilities for you if you
|
||||
distribute copies of the software, or if you modify it.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must give the recipients all the rights that
|
||||
you have. You must make sure that they, too, receive or can get the
|
||||
source code. And you must show them these terms so they know their
|
||||
rights.
|
||||
|
||||
We protect your rights with two steps: (1) copyright the software, and
|
||||
(2) offer you this license which gives you legal permission to copy,
|
||||
distribute and/or modify the software.
|
||||
|
||||
Also, for each author's protection and ours, we want to make certain
|
||||
that everyone understands that there is no warranty for this free
|
||||
software. If the software is modified by someone else and passed on, we
|
||||
want its recipients to know that what they have is not the original, so
|
||||
that any problems introduced by others will not reflect on the original
|
||||
authors' reputations.
|
||||
|
||||
Finally, any free program is threatened constantly by software
|
||||
patents. We wish to avoid the danger that redistributors of a free
|
||||
program will individually obtain patent licenses, in effect making the
|
||||
program proprietary. To prevent this, we have made it clear that any
|
||||
patent must be licensed for everyone's free use or not licensed at all.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
||||
|
||||
0. This License applies to any program or other work which contains
|
||||
a notice placed by the copyright holder saying it may be distributed
|
||||
under the terms of this General Public License. The "Program", below,
|
||||
refers to any such program or work, and a "work based on the Program"
|
||||
means either the Program or any derivative work under copyright law:
|
||||
that is to say, a work containing the Program or a portion of it,
|
||||
either verbatim or with modifications and/or translated into another
|
||||
language. (Hereinafter, translation is included without limitation in
|
||||
the term "modification".) Each licensee is addressed as "you".
|
||||
|
||||
Activities other than copying, distribution and modification are not
|
||||
covered by this License; they are outside its scope. The act of
|
||||
running the Program is not restricted, and the output from the Program
|
||||
is covered only if its contents constitute a work based on the
|
||||
Program (independent of having been made by running the Program).
|
||||
Whether that is true depends on what the Program does.
|
||||
|
||||
1. You may copy and distribute verbatim copies of the Program's
|
||||
source code as you receive it, in any medium, provided that you
|
||||
conspicuously and appropriately publish on each copy an appropriate
|
||||
copyright notice and disclaimer of warranty; keep intact all the
|
||||
notices that refer to this License and to the absence of any warranty;
|
||||
and give any other recipients of the Program a copy of this License
|
||||
along with the Program.
|
||||
|
||||
You may charge a fee for the physical act of transferring a copy, and
|
||||
you may at your option offer warranty protection in exchange for a fee.
|
||||
|
||||
2. You may modify your copy or copies of the Program or any portion
|
||||
of it, thus forming a work based on the Program, and copy and
|
||||
distribute such modifications or work under the terms of Section 1
|
||||
above, provided that you also meet all of these conditions:
|
||||
|
||||
a) You must cause the modified files to carry prominent notices
|
||||
stating that you changed the files and the date of any change.
|
||||
|
||||
b) You must cause any work that you distribute or publish, that in
|
||||
whole or in part contains or is derived from the Program or any
|
||||
part thereof, to be licensed as a whole at no charge to all third
|
||||
parties under the terms of this License.
|
||||
|
||||
c) If the modified program normally reads commands interactively
|
||||
when run, you must cause it, when started running for such
|
||||
interactive use in the most ordinary way, to print or display an
|
||||
announcement including an appropriate copyright notice and a
|
||||
notice that there is no warranty (or else, saying that you provide
|
||||
a warranty) and that users may redistribute the program under
|
||||
these conditions, and telling the user how to view a copy of this
|
||||
License. (Exception: if the Program itself is interactive but
|
||||
does not normally print such an announcement, your work based on
|
||||
the Program is not required to print an announcement.)
|
||||
|
||||
These requirements apply to the modified work as a whole. If
|
||||
identifiable sections of that work are not derived from the Program,
|
||||
and can be reasonably considered independent and separate works in
|
||||
themselves, then this License, and its terms, do not apply to those
|
||||
sections when you distribute them as separate works. But when you
|
||||
distribute the same sections as part of a whole which is a work based
|
||||
on the Program, the distribution of the whole must be on the terms of
|
||||
this License, whose permissions for other licensees extend to the
|
||||
entire whole, and thus to each and every part regardless of who wrote it.
|
||||
|
||||
Thus, it is not the intent of this section to claim rights or contest
|
||||
your rights to work written entirely by you; rather, the intent is to
|
||||
exercise the right to control the distribution of derivative or
|
||||
collective works based on the Program.
|
||||
|
||||
In addition, mere aggregation of another work not based on the Program
|
||||
with the Program (or with a work based on the Program) on a volume of
|
||||
a storage or distribution medium does not bring the other work under
|
||||
the scope of this License.
|
||||
|
||||
3. You may copy and distribute the Program (or a work based on it,
|
||||
under Section 2) in object code or executable form under the terms of
|
||||
Sections 1 and 2 above provided that you also do one of the following:
|
||||
|
||||
a) Accompany it with the complete corresponding machine-readable
|
||||
source code, which must be distributed under the terms of Sections
|
||||
1 and 2 above on a medium customarily used for software interchange; or,
|
||||
|
||||
b) Accompany it with a written offer, valid for at least three
|
||||
years, to give any third party, for a charge no more than your
|
||||
cost of physically performing source distribution, a complete
|
||||
machine-readable copy of the corresponding source code, to be
|
||||
distributed under the terms of Sections 1 and 2 above on a medium
|
||||
customarily used for software interchange; or,
|
||||
|
||||
c) Accompany it with the information you received as to the offer
|
||||
to distribute corresponding source code. (This alternative is
|
||||
allowed only for noncommercial distribution and only if you
|
||||
received the program in object code or executable form with such
|
||||
an offer, in accord with Subsection b above.)
|
||||
|
||||
The source code for a work means the preferred form of the work for
|
||||
making modifications to it. For an executable work, complete source
|
||||
code means all the source code for all modules it contains, plus any
|
||||
associated interface definition files, plus the scripts used to
|
||||
control compilation and installation of the executable. However, as a
|
||||
special exception, the source code distributed need not include
|
||||
anything that is normally distributed (in either source or binary
|
||||
form) with the major components (compiler, kernel, and so on) of the
|
||||
operating system on which the executable runs, unless that component
|
||||
itself accompanies the executable.
|
||||
|
||||
If distribution of executable or object code is made by offering
|
||||
access to copy from a designated place, then offering equivalent
|
||||
access to copy the source code from the same place counts as
|
||||
distribution of the source code, even though third parties are not
|
||||
compelled to copy the source along with the object code.
|
||||
|
||||
4. You may not copy, modify, sublicense, or distribute the Program
|
||||
except as expressly provided under this License. Any attempt
|
||||
otherwise to copy, modify, sublicense or distribute the Program is
|
||||
void, and will automatically terminate your rights under this License.
|
||||
However, parties who have received copies, or rights, from you under
|
||||
this License will not have their licenses terminated so long as such
|
||||
parties remain in full compliance.
|
||||
|
||||
5. You are not required to accept this License, since you have not
|
||||
signed it. However, nothing else grants you permission to modify or
|
||||
distribute the Program or its derivative works. These actions are
|
||||
prohibited by law if you do not accept this License. Therefore, by
|
||||
modifying or distributing the Program (or any work based on the
|
||||
Program), you indicate your acceptance of this License to do so, and
|
||||
all its terms and conditions for copying, distributing or modifying
|
||||
the Program or works based on it.
|
||||
|
||||
6. Each time you redistribute the Program (or any work based on the
|
||||
Program), the recipient automatically receives a license from the
|
||||
original licensor to copy, distribute or modify the Program subject to
|
||||
these terms and conditions. You may not impose any further
|
||||
restrictions on the recipients' exercise of the rights granted herein.
|
||||
You are not responsible for enforcing compliance by third parties to
|
||||
this License.
|
||||
|
||||
7. If, as a consequence of a court judgment or allegation of patent
|
||||
infringement or for any other reason (not limited to patent issues),
|
||||
conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot
|
||||
distribute so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you
|
||||
may not distribute the Program at all. For example, if a patent
|
||||
license would not permit royalty-free redistribution of the Program by
|
||||
all those who receive copies directly or indirectly through you, then
|
||||
the only way you could satisfy both it and this License would be to
|
||||
refrain entirely from distribution of the Program.
|
||||
|
||||
If any portion of this section is held invalid or unenforceable under
|
||||
any particular circumstance, the balance of the section is intended to
|
||||
apply and the section as a whole is intended to apply in other
|
||||
circumstances.
|
||||
|
||||
It is not the purpose of this section to induce you to infringe any
|
||||
patents or other property right claims or to contest validity of any
|
||||
such claims; this section has the sole purpose of protecting the
|
||||
integrity of the free software distribution system, which is
|
||||
implemented by public license practices. Many people have made
|
||||
generous contributions to the wide range of software distributed
|
||||
through that system in reliance on consistent application of that
|
||||
system; it is up to the author/donor to decide if he or she is willing
|
||||
to distribute software through any other system and a licensee cannot
|
||||
impose that choice.
|
||||
|
||||
This section is intended to make thoroughly clear what is believed to
|
||||
be a consequence of the rest of this License.
|
||||
|
||||
8. If the distribution and/or use of the Program is restricted in
|
||||
certain countries either by patents or by copyrighted interfaces, the
|
||||
original copyright holder who places the Program under this License
|
||||
may add an explicit geographical distribution limitation excluding
|
||||
those countries, so that distribution is permitted only in or among
|
||||
countries not thus excluded. In such case, this License incorporates
|
||||
the limitation as if written in the body of this License.
|
||||
|
||||
9. The Free Software Foundation may publish revised and/or new versions
|
||||
of the General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the Program
|
||||
specifies a version number of this License which applies to it and "any
|
||||
later version", you have the option of following the terms and conditions
|
||||
either of that version or of any later version published by the Free
|
||||
Software Foundation. If the Program does not specify a version number of
|
||||
this License, you may choose any version ever published by the Free Software
|
||||
Foundation.
|
||||
|
||||
10. If you wish to incorporate parts of the Program into other free
|
||||
programs whose distribution conditions are different, write to the author
|
||||
to ask for permission. For software which is copyrighted by the Free
|
||||
Software Foundation, write to the Free Software Foundation; we sometimes
|
||||
make exceptions for this. Our decision will be guided by the two goals
|
||||
of preserving the free status of all derivatives of our free software and
|
||||
of promoting the sharing and reuse of software generally.
|
||||
|
||||
NO WARRANTY
|
||||
|
||||
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
||||
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
||||
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
||||
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
||||
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
||||
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
||||
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
||||
REPAIR OR CORRECTION.
|
||||
|
||||
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
||||
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
||||
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
||||
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
||||
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
||||
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
||||
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
||||
POSSIBILITY OF SUCH DAMAGES.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
convey the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
<one line to give the program's name and a brief idea of what it does.>
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This program is free software; you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation; either version 2 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program; if not, write to the Free Software
|
||||
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program is interactive, make it output a short notice like this
|
||||
when it starts in an interactive mode:
|
||||
|
||||
Gnomovision version 69, Copyright (C) year name of author
|
||||
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, the commands you use may
|
||||
be called something other than `show w' and `show c'; they could even be
|
||||
mouse-clicks or menu items--whatever suits your program.
|
||||
|
||||
You should also get your employer (if you work as a programmer) or your
|
||||
school, if any, to sign a "copyright disclaimer" for the program, if
|
||||
necessary. Here is a sample; alter the names:
|
||||
|
||||
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
|
||||
`Gnomovision' (which makes passes at compilers) written by James Hacker.
|
||||
|
||||
<signature of Ty Coon>, 1 April 1989
|
||||
Ty Coon, President of Vice
|
||||
|
||||
This General Public License does not permit incorporating your program into
|
||||
proprietary programs. If your program is a subroutine library, you may
|
||||
consider it more useful to permit linking proprietary applications with the
|
||||
library. If this is what you want to do, use the GNU Library General
|
||||
Public License instead of this License.
|
BIN
FSDrivers/X64/exfat_ia32.efi
Normal file
BIN
FSDrivers/X64/exfat_ia32.efi
Normal file
Binary file not shown.
BIN
FSDrivers/X64/exfat_x64.efi
Normal file
BIN
FSDrivers/X64/exfat_x64.efi
Normal file
Binary file not shown.
BIN
FSDrivers/X64/ext2_x64.efi
Normal file
BIN
FSDrivers/X64/ext2_x64.efi
Normal file
Binary file not shown.
BIN
FSDrivers/X64/ext4_x64.efi
Normal file
BIN
FSDrivers/X64/ext4_x64.efi
Normal file
Binary file not shown.
BIN
FSDrivers/X64/ntfs_x64.efi
Normal file
BIN
FSDrivers/X64/ntfs_x64.efi
Normal file
Binary file not shown.
27
FSDrivers/exfat.inf
Normal file
27
FSDrivers/exfat.inf
Normal file
@ -0,0 +1,27 @@
|
||||
# ReadOnly exFAT filesystem driver
|
||||
# From https://efi.akeo.ie/ v1.5
|
||||
##
|
||||
|
||||
[Defines]
|
||||
INF_VERSION = 0x00010005
|
||||
BASE_NAME = exfat
|
||||
FILE_GUID = CB683001-379F-48C7-B7B6-707D29454BF5
|
||||
MODULE_TYPE = UEFI_DRIVER
|
||||
VERSION_STRING = 1.0
|
||||
|
||||
|
||||
#
|
||||
# The following information is for reference only and not required by the build tools.
|
||||
#
|
||||
# VALID_ARCHITECTURES = IA32 X64 IPF EBC
|
||||
#
|
||||
|
||||
VALID_ARCHITECTURES = X64 IA32
|
||||
|
||||
[Binaries.X64]
|
||||
PE32|X64/exfat_x64.efi|*
|
||||
|
||||
[Binaries.IA32]
|
||||
PE32|IA32/exfat_ia32.efi|*
|
||||
|
||||
|
25
FSDrivers/ext2.inf
Normal file
25
FSDrivers/ext2.inf
Normal file
@ -0,0 +1,25 @@
|
||||
# EXT2 filesystem driver. See */LICENSE.txt for details.
|
||||
# https://www.rodsbooks.com/refind/ v0.12
|
||||
|
||||
[Defines]
|
||||
INF_VERSION = 0x00010005
|
||||
BASE_NAME = ext2
|
||||
FILE_GUID = 8EC49C43-D1C4-4E6C-98BF-232CA5D89A1B
|
||||
MODULE_TYPE = UEFI_DRIVER
|
||||
VERSION_STRING = 1.0
|
||||
|
||||
|
||||
#
|
||||
# The following information is for reference only and not required by the build tools.
|
||||
#
|
||||
# VALID_ARCHITECTURES = IA32 X64 IPF EBC
|
||||
#
|
||||
|
||||
VALID_ARCHITECTURES = X64 IA32
|
||||
|
||||
[Binaries.X64]
|
||||
PE32|X64/ext2_x64.efi|*
|
||||
|
||||
[Binaries.IA32]
|
||||
PE32|IA32/ext2_ia32.efi|*
|
||||
|
25
FSDrivers/ext4.inf
Normal file
25
FSDrivers/ext4.inf
Normal file
@ -0,0 +1,25 @@
|
||||
# EXT4 filesystem driver. See */LICENSE.txt for details.
|
||||
# https://www.rodsbooks.com/refind/ v0.12
|
||||
|
||||
[Defines]
|
||||
INF_VERSION = 0x00010005
|
||||
BASE_NAME = ext4
|
||||
FILE_GUID = 9d380387-a15a-4053-ae19-ff3495b6d0d5
|
||||
MODULE_TYPE = UEFI_DRIVER
|
||||
VERSION_STRING = 1.0
|
||||
|
||||
|
||||
#
|
||||
# The following information is for reference only and not required by the build tools.
|
||||
#
|
||||
# VALID_ARCHITECTURES = IA32 X64 IPF EBC
|
||||
#
|
||||
|
||||
VALID_ARCHITECTURES = X64 IA32
|
||||
|
||||
[Binaries.X64]
|
||||
PE32|X64/ext4_x64.efi|*
|
||||
|
||||
[Binaries.IA32]
|
||||
PE32|IA32/ext4_ia32.efi|*
|
||||
|
27
FSDrivers/ntfs.inf
Normal file
27
FSDrivers/ntfs.inf
Normal file
@ -0,0 +1,27 @@
|
||||
# ReadOnly NTFS filesystem driver
|
||||
# From https://efi.akeo.ie/ v1.5
|
||||
##
|
||||
|
||||
[Defines]
|
||||
INF_VERSION = 0x00010005
|
||||
BASE_NAME = ntfs
|
||||
FILE_GUID = 2282efd0-678b-4753-8d06-200d5940285d
|
||||
MODULE_TYPE = UEFI_DRIVER
|
||||
VERSION_STRING = 1.0
|
||||
|
||||
|
||||
#
|
||||
# The following information is for reference only and not required by the build tools.
|
||||
#
|
||||
# VALID_ARCHITECTURES = IA32 X64 IPF EBC
|
||||
#
|
||||
|
||||
VALID_ARCHITECTURES = X64 IA32
|
||||
|
||||
[Binaries.X64]
|
||||
PE32|X64/ntfs_x64.efi|*
|
||||
|
||||
[Binaries.IA32]
|
||||
PE32|IA32/ntfs_ia32.efi|*
|
||||
|
||||
|
@ -7,6 +7,14 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
||||
#include <IndustryStandard/Pci.h>
|
||||
#include <Protocol/PciIo.h>
|
||||
#include <Protocol/PciRootBridgeIo.h>
|
||||
#include <Protocol/UsbIo.h>
|
||||
#include <Register/Amd/Cpuid.h>
|
||||
#include <Register/Intel/Cpuid.h>
|
||||
#include <Register/Intel/Msr.h>
|
||||
|
||||
#include "FrontPage.h"
|
||||
#include "FrontPageCustomizedUi.h"
|
||||
|
||||
@ -17,7 +25,6 @@ EFI_GUID mFrontPageGuid = FRONT_PAGE_FORMSET_GUID;
|
||||
BOOLEAN mResetRequired = FALSE;
|
||||
|
||||
EFI_FORM_BROWSER2_PROTOCOL *gFormBrowser2;
|
||||
CHAR8 *mLanguageString;
|
||||
BOOLEAN mModeInitialized = FALSE;
|
||||
//
|
||||
// Boot video resolution and text mode.
|
||||
@ -34,11 +41,12 @@ UINT32 mSetupTextModeRow = 0;
|
||||
UINT32 mSetupHorizontalResolution = 0;
|
||||
UINT32 mSetupVerticalResolution = 0;
|
||||
|
||||
EFI_SYSTEM_TABLE * gSystemTable = NULL;
|
||||
|
||||
FRONT_PAGE_CALLBACK_DATA gFrontPagePrivate = {
|
||||
FRONT_PAGE_CALLBACK_DATA_SIGNATURE,
|
||||
NULL,
|
||||
NULL,
|
||||
NULL,
|
||||
{
|
||||
FakeExtractConfig,
|
||||
FakeRouteConfig,
|
||||
@ -211,7 +219,7 @@ UpdateFrontPageForm (
|
||||
//
|
||||
StartGuidLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (StartOpCodeHandle, &gEfiIfrTianoGuid, NULL, sizeof (EFI_IFR_GUID_LABEL));
|
||||
StartGuidLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||
StartGuidLabel->Number = LABEL_FRANTPAGE_INFORMATION;
|
||||
StartGuidLabel->Number = LABEL_FRONTPAGE_INFORMATION;
|
||||
//
|
||||
// Create Hii Extend Label OpCode as the end opcode
|
||||
//
|
||||
@ -239,6 +247,124 @@ UpdateFrontPageForm (
|
||||
HiiFreeOpCodeHandle (EndOpCodeHandle);
|
||||
}
|
||||
|
||||
// FIXME: Copied from Device Manager; clean up
|
||||
void ShowSecureBootConfig(void)
|
||||
{
|
||||
void *StartHandle;
|
||||
void *EndHandle;
|
||||
EFI_IFR_GUID_LABEL *StartLabel;
|
||||
EFI_IFR_GUID_LABEL *EndLabel;
|
||||
EFI_HII_HANDLE *HiiHandles;
|
||||
EFI_HII_HANDLE HiiHandle = gFrontPagePrivate.HiiHandle;
|
||||
UINTN Index;
|
||||
EFI_STRING String;
|
||||
EFI_STRING_ID Token;
|
||||
EFI_STRING_ID TokenHelp;
|
||||
EFI_IFR_FORM_SET *Buffer = NULL;
|
||||
UINTN BufferSize = 0;
|
||||
UINT8 ClassGuidNum;
|
||||
EFI_GUID *ClassGuid;
|
||||
UINTN TempSize = 0;
|
||||
UINT8 *Ptr;
|
||||
EFI_STATUS Status;
|
||||
// XXX: Copied from SecureBootConfigDxe
|
||||
EFI_GUID SecureBootConfigGuid = { 0x5daf50a5, 0xea81, 0x4de2, {0x8f, 0x9b, 0xca, 0xbd, 0xa9, 0xcf, 0x5c, 0x14}};
|
||||
|
||||
StartHandle = HiiAllocateOpCodeHandle();
|
||||
ASSERT(StartHandle != NULL);
|
||||
|
||||
EndHandle = HiiAllocateOpCodeHandle();
|
||||
ASSERT(EndHandle != NULL);
|
||||
|
||||
StartLabel = (EFI_IFR_GUID_LABEL *)HiiCreateGuidOpCode(StartHandle, &gEfiIfrTianoGuid, NULL, sizeof(*StartLabel));
|
||||
StartLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||
StartLabel->Number = LABEL_DEVICES_LIST;
|
||||
|
||||
EndLabel = (EFI_IFR_GUID_LABEL *)HiiCreateGuidOpCode(EndHandle, &gEfiIfrTianoGuid, NULL, sizeof(*EndLabel));
|
||||
EndLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||
EndLabel->Number = LABEL_END;
|
||||
|
||||
// Get SecureBootConfig handle
|
||||
HiiHandles = HiiGetHiiHandles(&SecureBootConfigGuid);
|
||||
ASSERT(HiiHandles != NULL);
|
||||
|
||||
// Search for formset of each class type
|
||||
for (Index = 0; HiiHandles[Index] != NULL; Index++) {
|
||||
Status = HiiGetFormSetFromHiiHandle(HiiHandles[Index], &Buffer, &BufferSize);
|
||||
if (EFI_ERROR(Status)) {
|
||||
continue;
|
||||
}
|
||||
|
||||
Ptr = (UINT8 *)Buffer;
|
||||
while (TempSize < BufferSize) {
|
||||
TempSize += ((EFI_IFR_OP_HEADER *)Ptr)->Length;
|
||||
if (((EFI_IFR_OP_HEADER *)Ptr)->Length <= OFFSET_OF (EFI_IFR_FORM_SET, Flags)) {
|
||||
Ptr += ((EFI_IFR_OP_HEADER *)Ptr)->Length;
|
||||
continue;
|
||||
}
|
||||
|
||||
ClassGuidNum = (UINT8)(((EFI_IFR_FORM_SET *)Ptr)->Flags & 0x3);
|
||||
ClassGuid = (EFI_GUID *)(VOID *)(Ptr + sizeof(EFI_IFR_FORM_SET));
|
||||
while (ClassGuidNum-- > 0) {
|
||||
if (CompareGuid(&gEfiHiiPlatformSetupFormsetGuid, ClassGuid) == 0) {
|
||||
ClassGuid++;
|
||||
continue;
|
||||
}
|
||||
|
||||
String = HiiGetString(HiiHandles[Index], ((EFI_IFR_FORM_SET *)Ptr)->FormSetTitle, NULL);
|
||||
if (String == NULL) {
|
||||
String = HiiGetString(HiiHandle, STRING_TOKEN (STR_MISSING_STRING), NULL);
|
||||
ASSERT (String != NULL);
|
||||
}
|
||||
|
||||
Token = HiiSetString(HiiHandle, 0, String, NULL);
|
||||
FreePool(String);
|
||||
|
||||
String = HiiGetString(HiiHandles[Index], ((EFI_IFR_FORM_SET *)Ptr)->Help, NULL);
|
||||
if (String == NULL) {
|
||||
String = HiiGetString(HiiHandle, STRING_TOKEN (STR_MISSING_STRING), NULL);
|
||||
ASSERT(String != NULL);
|
||||
}
|
||||
|
||||
TokenHelp = HiiSetString(HiiHandle, 0, String, NULL);
|
||||
FreePool(String);
|
||||
|
||||
HiiCreateGotoExOpCode(
|
||||
StartHandle,
|
||||
0,
|
||||
Token,
|
||||
TokenHelp,
|
||||
0,
|
||||
0,
|
||||
0,
|
||||
&SecureBootConfigGuid,
|
||||
0
|
||||
);
|
||||
|
||||
break;
|
||||
}
|
||||
|
||||
Ptr += ((EFI_IFR_OP_HEADER *)Ptr)->Length;
|
||||
}
|
||||
|
||||
FreePool (Buffer);
|
||||
Buffer = NULL;
|
||||
TempSize = 0;
|
||||
BufferSize = 0;
|
||||
}
|
||||
|
||||
HiiUpdateForm(
|
||||
HiiHandle,
|
||||
&mFrontPageGuid,
|
||||
FRONT_PAGE_FORM_ID,
|
||||
StartHandle,
|
||||
EndHandle
|
||||
);
|
||||
|
||||
HiiFreeOpCodeHandle(StartHandle);
|
||||
HiiFreeOpCodeHandle(EndHandle);
|
||||
}
|
||||
|
||||
/**
|
||||
Initialize HII information for the FrontPage
|
||||
|
||||
@ -297,6 +423,8 @@ InitializeFrontPage (
|
||||
//
|
||||
UpdateFrontPageForm();
|
||||
|
||||
ShowSecureBootConfig();
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
@ -367,10 +495,6 @@ FreeFrontPage(
|
||||
// Publish our HII data
|
||||
//
|
||||
HiiRemovePackages (gFrontPagePrivate.HiiHandle);
|
||||
if (gFrontPagePrivate.LanguageToken != NULL) {
|
||||
FreePool (gFrontPagePrivate.LanguageToken);
|
||||
gFrontPagePrivate.LanguageToken = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
@ -492,6 +616,462 @@ GetOptionalStringByIndex (
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
UINT16 SmbiosTableLength (SMBIOS_STRUCTURE_POINTER SmbiosTableN)
|
||||
{
|
||||
CHAR8 *AChar;
|
||||
UINT16 Length;
|
||||
|
||||
AChar = (CHAR8 *)(SmbiosTableN.Raw + SmbiosTableN.Hdr->Length);
|
||||
while ((*AChar != 0) || (*(AChar + 1) != 0)) {
|
||||
AChar ++; //stop at 00 - first 0
|
||||
}
|
||||
Length = (UINT16)((UINTN)AChar - (UINTN)SmbiosTableN.Raw + 2); //length includes 00
|
||||
return Length;
|
||||
}
|
||||
|
||||
SMBIOS_STRUCTURE_POINTER GetSmbiosTableFromType (
|
||||
SMBIOS_TABLE_ENTRY_POINT *SmbiosPoint, UINT8 SmbiosType, UINTN IndexTable)
|
||||
{
|
||||
SMBIOS_STRUCTURE_POINTER SmbiosTableN;
|
||||
UINTN SmbiosTypeIndex;
|
||||
|
||||
SmbiosTypeIndex = 0;
|
||||
SmbiosTableN.Raw = (UINT8 *)((UINTN)SmbiosPoint->TableAddress);
|
||||
if (SmbiosTableN.Raw == NULL) {
|
||||
return SmbiosTableN;
|
||||
}
|
||||
while ((SmbiosTypeIndex != IndexTable) || (SmbiosTableN.Hdr->Type != SmbiosType)) {
|
||||
if (SmbiosTableN.Hdr->Type == SMBIOS_TYPE_END_OF_TABLE) {
|
||||
SmbiosTableN.Raw = NULL;
|
||||
return SmbiosTableN;
|
||||
}
|
||||
if (SmbiosTableN.Hdr->Type == SmbiosType) {
|
||||
SmbiosTypeIndex++;
|
||||
}
|
||||
SmbiosTableN.Raw = (UINT8 *)(SmbiosTableN.Raw + SmbiosTableLength (SmbiosTableN));
|
||||
}
|
||||
return SmbiosTableN;
|
||||
}
|
||||
|
||||
STATIC
|
||||
VOID
|
||||
WarnNoBootableMedia (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
CHAR16 *String;
|
||||
EFI_STRING_ID Token;
|
||||
EFI_BOOT_MANAGER_LOAD_OPTION *BootOption;
|
||||
UINTN BootOptionCount;
|
||||
UINTN Index;
|
||||
UINTN Count = 0;
|
||||
|
||||
String = AllocateZeroPool (0x60);
|
||||
BootOption = EfiBootManagerGetLoadOptions (&BootOptionCount, LoadOptionTypeBoot);
|
||||
|
||||
for (Index = 0; Index < BootOptionCount; Index++) {
|
||||
//
|
||||
// Don't count the hidden/inactive boot option
|
||||
//
|
||||
if (((BootOption[Index].Attributes & LOAD_OPTION_HIDDEN) != 0) || ((BootOption[Index].Attributes & LOAD_OPTION_ACTIVE) == 0)) {
|
||||
continue;
|
||||
}
|
||||
|
||||
Count++;
|
||||
}
|
||||
|
||||
EfiBootManagerFreeLoadOptions (BootOption, BootOptionCount);
|
||||
|
||||
if (Count == 0) {
|
||||
StrCatS (String, 0x60 / sizeof (CHAR16), L"Warning: No bootable media found");
|
||||
} else {
|
||||
StrCatS (String, 0x60 / sizeof (CHAR16), L"");
|
||||
}
|
||||
|
||||
Token = STRING_TOKEN (STR_NO_BOOTABLE_MEDIA);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, String, NULL);
|
||||
FreePool(String);
|
||||
}
|
||||
|
||||
BOOLEAN
|
||||
StandardSignatureIsAuthenticAMD (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
UINT32 RegEbx;
|
||||
UINT32 RegEcx;
|
||||
UINT32 RegEdx;
|
||||
|
||||
AsmCpuid (CPUID_SIGNATURE, NULL, &RegEbx, &RegEcx, &RegEdx);
|
||||
return (RegEbx == CPUID_SIGNATURE_AUTHENTIC_AMD_EBX &&
|
||||
RegEcx == CPUID_SIGNATURE_AUTHENTIC_AMD_ECX &&
|
||||
RegEdx == CPUID_SIGNATURE_AUTHENTIC_AMD_EDX);
|
||||
}
|
||||
|
||||
BOOLEAN
|
||||
StandardSignatureIsGenuineIntel (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
UINT32 RegEbx;
|
||||
UINT32 RegEcx;
|
||||
UINT32 RegEdx;
|
||||
|
||||
AsmCpuid (CPUID_SIGNATURE, NULL, &RegEbx, &RegEcx, &RegEdx);
|
||||
return (RegEbx == CPUID_SIGNATURE_GENUINE_INTEL_EBX &&
|
||||
RegEcx == CPUID_SIGNATURE_GENUINE_INTEL_ECX &&
|
||||
RegEdx == CPUID_SIGNATURE_GENUINE_INTEL_EDX);
|
||||
}
|
||||
|
||||
typedef struct {
|
||||
CHAR8 Signature[8];
|
||||
UINT8 Checksum;
|
||||
CHAR8 OemId[6];
|
||||
UINT8 Revision;
|
||||
UINT32 RsdtAddress;
|
||||
} ACPI_RSDP;
|
||||
|
||||
CHAR8 RSDP_SIGNATURE[8] = {'R', 'S', 'D', ' ', 'P', 'T', 'R', ' '};
|
||||
|
||||
typedef struct {
|
||||
CHAR8 Signature[4];
|
||||
UINT32 Length;
|
||||
UINT8 Revision;
|
||||
UINT8 Checksum;
|
||||
CHAR8 OemId[6];
|
||||
CHAR8 OemTableId[8];
|
||||
UINT32 OemRevision;
|
||||
UINT32 CreatorId;
|
||||
UINT32 CreatorRevision;
|
||||
} ACPI_SDT_HEADER;
|
||||
|
||||
CHAR8 RSDT_SIGNATURE[4] = {'R', 'S', 'D', 'T'};
|
||||
|
||||
STATIC ACPI_SDT_HEADER* FindAcpiTable(CHAR8 Name[4]) {
|
||||
UINTN Index;
|
||||
EFI_CONFIGURATION_TABLE* ConfigurationTable;
|
||||
UINTN RsdpPtr;
|
||||
ACPI_RSDP* Rsdp;
|
||||
UINTN RsdtPtr;
|
||||
ACPI_SDT_HEADER* Rsdt;
|
||||
UINTN TablePtr;
|
||||
ACPI_SDT_HEADER* Table;
|
||||
|
||||
DEBUG ((EFI_D_INFO, "FindAcpiTable: '%c%c%c%c'\n",
|
||||
Name[0],
|
||||
Name[1],
|
||||
Name[2],
|
||||
Name[3]
|
||||
));
|
||||
|
||||
if (gSystemTable == NULL) {
|
||||
DEBUG ((EFI_D_INFO, " System Table missing\n"));
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Search the table for an entry that matches the ACPI Table Guid
|
||||
for (Index = 0; Index < gSystemTable->NumberOfTableEntries; Index++) {
|
||||
if (CompareGuid (&gEfiAcpiTableGuid, &(gSystemTable->ConfigurationTable[Index].VendorGuid))) {
|
||||
ConfigurationTable = &gSystemTable->ConfigurationTable[Index];
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (ConfigurationTable == NULL) {
|
||||
DEBUG ((EFI_D_INFO, " ACPI Configuration Table missing\n"));
|
||||
return NULL;
|
||||
}
|
||||
|
||||
RsdpPtr = (UINTN)ConfigurationTable->VendorTable;
|
||||
DEBUG ((EFI_D_INFO, " RSDP 0x%x\n", RsdpPtr));
|
||||
Rsdp = (ACPI_RSDP*)RsdpPtr;
|
||||
DEBUG ((EFI_D_INFO, " Signature: '%c%c%c%c%c%c%c%c'\n",
|
||||
Rsdp->Signature[0],
|
||||
Rsdp->Signature[1],
|
||||
Rsdp->Signature[2],
|
||||
Rsdp->Signature[3],
|
||||
Rsdp->Signature[4],
|
||||
Rsdp->Signature[5],
|
||||
Rsdp->Signature[6],
|
||||
Rsdp->Signature[7]
|
||||
));
|
||||
if (CompareMem(Rsdp->Signature, RSDP_SIGNATURE, 8) != 0) {
|
||||
DEBUG ((EFI_D_INFO, " RSDP invalid signature\n"));
|
||||
return NULL;
|
||||
}
|
||||
DEBUG ((EFI_D_INFO, " Revision: 0x%x\n", Rsdp->Revision));
|
||||
|
||||
RsdtPtr = (UINTN)Rsdp->RsdtAddress;
|
||||
DEBUG ((EFI_D_INFO, " RSDT 0x%x\n", RsdpPtr));
|
||||
Rsdt = (ACPI_SDT_HEADER*)RsdtPtr;
|
||||
DEBUG ((EFI_D_INFO, " Signature: '%c%c%c%c'\n",
|
||||
Rsdt->Signature[0],
|
||||
Rsdt->Signature[1],
|
||||
Rsdt->Signature[2],
|
||||
Rsdt->Signature[3]
|
||||
));
|
||||
if (CompareMem(Rsdt->Signature, RSDT_SIGNATURE, 4) != 0) {
|
||||
DEBUG ((EFI_D_INFO, " RSDT invalid signature\n"));
|
||||
return NULL;
|
||||
}
|
||||
DEBUG ((EFI_D_INFO, " Revision: 0x%x\n", Rsdt->Revision));
|
||||
DEBUG ((EFI_D_INFO, " Length: 0x%x\n", Rsdt->Length));
|
||||
|
||||
for (Index = sizeof(ACPI_SDT_HEADER); Index < Rsdt->Length; Index += 4) {
|
||||
TablePtr = (UINTN)(*(UINT32*)(RsdtPtr + Index));
|
||||
DEBUG ((EFI_D_INFO, " Table %d: 0x%x\n", Index, TablePtr));
|
||||
Table = (ACPI_SDT_HEADER*)TablePtr;
|
||||
DEBUG ((EFI_D_INFO, " Signature: '%c%c%c%c'\n",
|
||||
Table->Signature[0],
|
||||
Table->Signature[1],
|
||||
Table->Signature[2],
|
||||
Table->Signature[3]
|
||||
));
|
||||
DEBUG ((EFI_D_INFO, " Revision: 0x%x\n", Table->Revision));
|
||||
DEBUG ((EFI_D_INFO, " Length: 0x%x\n", Table->Length));
|
||||
|
||||
if (CompareMem(Table->Signature, Name, 4) == 0) {
|
||||
DEBUG ((EFI_D_INFO, " Match found\n"));
|
||||
return Table;
|
||||
}
|
||||
}
|
||||
|
||||
DEBUG ((EFI_D_INFO, " No match found\n"));
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// From PciBusDxe
|
||||
STATIC
|
||||
EFI_STATUS
|
||||
PciDevicePresent(
|
||||
OUT PCI_TYPE00 *Pci,
|
||||
IN UINT8 Bus,
|
||||
IN UINT8 Device,
|
||||
IN UINT8 Func
|
||||
)
|
||||
{
|
||||
UINT64 Address = EFI_PCI_ADDRESS(Bus, Device, Func, 0);
|
||||
EFI_PCI_ROOT_BRIDGE_IO_PROTOCOL *PciRootBridgeIo;
|
||||
EFI_STATUS Status;
|
||||
EFI_HANDLE *PciIoBuffer;
|
||||
UINTN PciIoHandleCount = 0;
|
||||
|
||||
Status = gBS->LocateHandleBuffer(
|
||||
ByProtocol,
|
||||
&gEfiPciRootBridgeIoProtocolGuid,
|
||||
NULL,
|
||||
&PciIoHandleCount,
|
||||
&PciIoBuffer
|
||||
);
|
||||
|
||||
if (EFI_ERROR(Status)) {
|
||||
DEBUG((EFI_D_INFO, "%a: Failed to get PciRootBridgeIo handles: %r\n", __FUNCTION__, Status));
|
||||
return Status;
|
||||
}
|
||||
|
||||
for (UINTN Index = 0; Index < PciIoHandleCount; Index++) {
|
||||
Status = gBS->OpenProtocol(
|
||||
PciIoBuffer[Index],
|
||||
&gEfiPciRootBridgeIoProtocolGuid,
|
||||
(VOID *)&PciRootBridgeIo,
|
||||
NULL,
|
||||
NULL,
|
||||
EFI_OPEN_PROTOCOL_GET_PROTOCOL
|
||||
);
|
||||
|
||||
if (EFI_ERROR(Status)) {
|
||||
DEBUG((EFI_D_INFO, "%a: Failed to open PciRootBridgeIo protocol: %r\n", __FUNCTION__, Status));
|
||||
continue;
|
||||
}
|
||||
|
||||
// Read the Vendor ID register
|
||||
Status = PciRootBridgeIo->Pci.Read(
|
||||
PciRootBridgeIo,
|
||||
EfiPciWidthUint32,
|
||||
Address,
|
||||
1,
|
||||
Pci
|
||||
);
|
||||
|
||||
if (EFI_ERROR(Status)) {
|
||||
DEBUG((EFI_D_INFO, "%a: Failed to read vendor ID: %r\n", __FUNCTION__, Status));
|
||||
continue;
|
||||
}
|
||||
|
||||
// Read the entire config header for the device
|
||||
Status = PciRootBridgeIo->Pci.Read(
|
||||
PciRootBridgeIo,
|
||||
EfiPciWidthUint32,
|
||||
Address,
|
||||
sizeof(PCI_TYPE00) / sizeof(UINT32),
|
||||
Pci
|
||||
);
|
||||
|
||||
FreePool(PciIoBuffer);
|
||||
return Status;
|
||||
}
|
||||
|
||||
FreePool(PciIoBuffer);
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
/*
|
||||
* Check for Intel device with class [0780] at 00:16.0.
|
||||
*/
|
||||
STATIC
|
||||
BOOLEAN
|
||||
HasCsmeDevice(VOID)
|
||||
{
|
||||
PCI_TYPE00 Pci;
|
||||
|
||||
if (!EFI_ERROR(PciDevicePresent(&Pci, 0x00, 0x16, 0x00))) {
|
||||
DEBUG((EFI_D_INFO, "%a: vid=0x%04X, class=[%02X,%02X,%02X]\n", __FUNCTION__,
|
||||
Pci.Hdr.VendorId, Pci.Hdr.ClassCode[0], Pci.Hdr.ClassCode[1], Pci.Hdr.ClassCode[2]));
|
||||
return Pci.Hdr.VendorId == 0x8086 &&
|
||||
Pci.Hdr.ClassCode[2] == PCI_CLASS_SCC &&
|
||||
Pci.Hdr.ClassCode[1] == PCI_SUBCLASS_SCC_OTHER;
|
||||
}
|
||||
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
STATIC VOID FirmwareConfigurationInformation(VOID) {
|
||||
EFI_STRING_ID Token;
|
||||
|
||||
Token = STRING_TOKEN (STR_VIRTUALIZATION);
|
||||
if (StandardSignatureIsGenuineIntel()) {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"Intel Virtualization", NULL);
|
||||
|
||||
Token = STRING_TOKEN (STR_VIRTUALIZATION_STATUS);
|
||||
CPUID_VERSION_INFO_ECX VersionInfoEcx;
|
||||
AsmCpuid (CPUID_VERSION_INFO, NULL, NULL, &VersionInfoEcx.Uint32, NULL);
|
||||
if (VersionInfoEcx.Bits.VMX) {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"VT-x: Active", NULL);
|
||||
} else {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"VT-x: Deactivated", NULL);
|
||||
}
|
||||
|
||||
Token = STRING_TOKEN (STR_IOMMU_STATUS);
|
||||
CHAR8 TableName[4] = {'D', 'M', 'A', 'R'};
|
||||
if (FindAcpiTable(TableName)) {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"VT-d: Active", NULL);
|
||||
} else {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"VT-d: Deactivated", NULL);
|
||||
}
|
||||
|
||||
Token = STRING_TOKEN(STR_ME_STATUS);
|
||||
if (HasCsmeDevice()) {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"The Intel Management Engine is enabled.", NULL);
|
||||
} else {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"The Intel Management Engine is disabled at runtime to increase security.", NULL);
|
||||
}
|
||||
} else if (StandardSignatureIsAuthenticAMD()) {
|
||||
//TODO: verify AMD tests
|
||||
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"AMD Virtualization", NULL);
|
||||
|
||||
Token = STRING_TOKEN (STR_VIRTUALIZATION_STATUS);
|
||||
CPUID_AMD_EXTENDED_CPU_SIG_ECX AmdExtendedCpuSigEcx;
|
||||
AsmCpuid (CPUID_EXTENDED_CPU_SIG, NULL, NULL, &AmdExtendedCpuSigEcx.Uint32, NULL);
|
||||
if (AmdExtendedCpuSigEcx.Bits.SVM) {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"AMD-V: Active", NULL);
|
||||
} else {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"AMD-V: Deactivated", NULL);
|
||||
}
|
||||
|
||||
Token = STRING_TOKEN (STR_IOMMU_STATUS);
|
||||
//TODO: proper test for AMD IOMMU
|
||||
BOOLEAN iommu_active = FALSE;
|
||||
if (iommu_active) {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"AMD-Vi: Active", NULL);
|
||||
} else {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"AMD-Vi: Deactivated", NULL);
|
||||
}
|
||||
}
|
||||
|
||||
Token = STRING_TOKEN (STR_TPM_STATUS);
|
||||
CHAR8 TableName[4] = {'T', 'P', 'M', '2'};
|
||||
if (FindAcpiTable(TableName)) {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"Trusted Platform Module: Active", NULL);
|
||||
} else {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"Trusted Platform Module: Deactivated", NULL);
|
||||
}
|
||||
}
|
||||
|
||||
VOID WebcamStatus(VOID) {
|
||||
EFI_STATUS Status;
|
||||
UINTN UsbIoHandleCount;
|
||||
EFI_HANDLE *UsbIoBuffer;
|
||||
UINTN Index;
|
||||
EFI_USB_IO_PROTOCOL *UsbIo;
|
||||
EFI_USB_DEVICE_DESCRIPTOR DevDesc;
|
||||
EFI_USB_INTERFACE_DESCRIPTOR IntfDesc;
|
||||
UINTN Webcams;
|
||||
EFI_STRING_ID Token;
|
||||
|
||||
//
|
||||
// Get all Usb IO handles in system
|
||||
//
|
||||
UsbIoHandleCount = 0;
|
||||
Status = gBS->LocateHandleBuffer (ByProtocol, &gEfiUsbIoProtocolGuid, NULL, &UsbIoHandleCount, &UsbIoBuffer);
|
||||
if (EFI_ERROR(Status)) {
|
||||
DEBUG ((EFI_D_INFO, "Failed to read UsbIo handles: 0x%x\n", Status));
|
||||
return;
|
||||
}
|
||||
|
||||
Webcams = 0;
|
||||
for (Index = 0; Index < UsbIoHandleCount; Index++) {
|
||||
DEBUG ((EFI_D_INFO, "UsbIo Handle %d\n", Index));
|
||||
|
||||
//
|
||||
// Get the child Usb IO interface
|
||||
//
|
||||
Status = gBS->HandleProtocol(
|
||||
UsbIoBuffer[Index],
|
||||
&gEfiUsbIoProtocolGuid,
|
||||
(VOID **) &UsbIo
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((EFI_D_INFO, " Failed to find UsbIo protocol\n"));
|
||||
continue;
|
||||
}
|
||||
|
||||
Status = UsbIo->UsbGetDeviceDescriptor (UsbIo, &DevDesc);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((EFI_D_INFO, " Failed to get device descriptor\n"));
|
||||
continue;
|
||||
}
|
||||
|
||||
DEBUG ((EFI_D_INFO, " ID: 0x%04X:0x%04X\n", DevDesc.IdVendor, DevDesc.IdProduct));
|
||||
DEBUG ((EFI_D_INFO, " DeviceClass: %d\n", DevDesc.DeviceClass));
|
||||
DEBUG ((EFI_D_INFO, " DeviceSubClass: %d\n", DevDesc.DeviceSubClass));
|
||||
DEBUG ((EFI_D_INFO, " DeviceProtocol: %d\n", DevDesc.DeviceProtocol));
|
||||
|
||||
Status = UsbIo->UsbGetInterfaceDescriptor (UsbIo, &IntfDesc);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((EFI_D_INFO, " Failed to get interface descriptor\n"));
|
||||
continue;
|
||||
}
|
||||
|
||||
DEBUG ((EFI_D_INFO, " Interface: %d\n", IntfDesc.InterfaceNumber));
|
||||
DEBUG ((EFI_D_INFO, " InterfaceClass: %d\n", IntfDesc.InterfaceClass));
|
||||
DEBUG ((EFI_D_INFO, " InterfaceSubClass: %d\n", IntfDesc.InterfaceSubClass));
|
||||
DEBUG ((EFI_D_INFO, " InterfaceProtocol: %d\n", IntfDesc.InterfaceProtocol));
|
||||
|
||||
if (IntfDesc.InterfaceClass == 14 && IntfDesc.InterfaceSubClass == 1) {
|
||||
DEBUG ((EFI_D_INFO, " Detected Video Control interface\n"));
|
||||
Webcams++;
|
||||
}
|
||||
}
|
||||
|
||||
FreePool (UsbIoBuffer);
|
||||
|
||||
//TODO: logic for not showing the warning on desktops
|
||||
Token = STRING_TOKEN (STR_WEBCAM_STATUS);
|
||||
if (Webcams == 0) {
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, Token, L"Info: Webcam Module Disconnected", NULL);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
|
||||
@ -503,154 +1083,104 @@ UpdateFrontPageBannerStrings (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
UINT8 StrIndex;
|
||||
CHAR16 *NewString;
|
||||
CHAR16 *FirmwareVersionString;
|
||||
EFI_STATUS Status;
|
||||
EFI_SMBIOS_HANDLE SmbiosHandle;
|
||||
EFI_SMBIOS_PROTOCOL *Smbios;
|
||||
SMBIOS_TABLE_TYPE0 *Type0Record;
|
||||
SMBIOS_TABLE_TYPE1 *Type1Record;
|
||||
SMBIOS_TABLE_TYPE4 *Type4Record;
|
||||
SMBIOS_TABLE_TYPE19 *Type19Record;
|
||||
EFI_SMBIOS_TABLE_HEADER *Record;
|
||||
UINT64 InstalledMemory;
|
||||
BOOLEAN FoundCpu;
|
||||
EFI_STRING_ID TokenToUpdate;
|
||||
EFI_PHYSICAL_ADDRESS *Table;
|
||||
SMBIOS_TABLE_ENTRY_POINT *EntryPoint;
|
||||
SMBIOS_STRUCTURE_POINTER SmbiosTable;
|
||||
BOOLEAN CheckWebcam;
|
||||
|
||||
InstalledMemory = 0;
|
||||
FoundCpu = 0;
|
||||
|
||||
//
|
||||
// Update default banner string.
|
||||
//
|
||||
NewString = HiiGetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_CUSTOMIZE_BANNER_LINE4_LEFT), NULL);
|
||||
UiCustomizeFrontPageBanner (4, TRUE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_CUSTOMIZE_BANNER_LINE4_LEFT), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
|
||||
NewString = HiiGetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_CUSTOMIZE_BANNER_LINE4_RIGHT), NULL);
|
||||
UiCustomizeFrontPageBanner (4, FALSE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_CUSTOMIZE_BANNER_LINE4_RIGHT), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
|
||||
NewString = HiiGetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_CUSTOMIZE_BANNER_LINE5_LEFT), NULL);
|
||||
UiCustomizeFrontPageBanner (5, TRUE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_CUSTOMIZE_BANNER_LINE5_LEFT), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
|
||||
NewString = HiiGetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_CUSTOMIZE_BANNER_LINE5_RIGHT), NULL);
|
||||
UiCustomizeFrontPageBanner (5, FALSE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_CUSTOMIZE_BANNER_LINE5_RIGHT), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
|
||||
//
|
||||
// Update Front Page banner strings base on SmBios Table.
|
||||
//
|
||||
Status = gBS->LocateProtocol (&gEfiSmbiosProtocolGuid, NULL, (VOID **) &Smbios);
|
||||
if (EFI_ERROR (Status)) {
|
||||
//
|
||||
// Smbios protocol not found, get the default value.
|
||||
//
|
||||
NewString = HiiGetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_COMPUTER_MODEL), NULL);
|
||||
UiCustomizeFrontPageBanner (1, TRUE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_COMPUTER_MODEL), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
|
||||
NewString = HiiGetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_CPU_MODEL), NULL);
|
||||
UiCustomizeFrontPageBanner (2, TRUE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_CPU_MODEL), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
|
||||
NewString = HiiGetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_CPU_SPEED), NULL);
|
||||
UiCustomizeFrontPageBanner (2, FALSE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_CPU_SPEED), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
|
||||
NewString = HiiGetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_BIOS_VERSION), NULL);
|
||||
UiCustomizeFrontPageBanner (3, TRUE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_BIOS_VERSION), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
|
||||
NewString = HiiGetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_MEMORY_SIZE), NULL);
|
||||
UiCustomizeFrontPageBanner (3, FALSE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_MEMORY_SIZE), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
FirmwareConfigurationInformation();
|
||||
WarnNoBootableMedia ();
|
||||
|
||||
Status = EfiGetSystemConfigurationTable (&gEfiSmbiosTableGuid, (VOID **) &Table);
|
||||
if (EFI_ERROR (Status) || Table == NULL) {
|
||||
return;
|
||||
}
|
||||
|
||||
SmbiosHandle = SMBIOS_HANDLE_PI_RESERVED;
|
||||
Status = Smbios->GetNext (Smbios, &SmbiosHandle, NULL, &Record, NULL);
|
||||
while (!EFI_ERROR(Status)) {
|
||||
if (Record->Type == SMBIOS_TYPE_BIOS_INFORMATION) {
|
||||
Type0Record = (SMBIOS_TABLE_TYPE0 *) Record;
|
||||
StrIndex = Type0Record->BiosVersion;
|
||||
GetOptionalStringByIndex ((CHAR8*)((UINT8*)Type0Record + Type0Record->Hdr.Length), StrIndex, &NewString);
|
||||
EntryPoint = (SMBIOS_TABLE_ENTRY_POINT*)Table;
|
||||
|
||||
FirmwareVersionString = (CHAR16 *) PcdGetPtr (PcdFirmwareVersionString);
|
||||
if (*FirmwareVersionString != 0x0000 ) {
|
||||
FreePool (NewString);
|
||||
NewString = (CHAR16 *) PcdGetPtr (PcdFirmwareVersionString);
|
||||
UiCustomizeFrontPageBanner (3, TRUE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_BIOS_VERSION), NewString, NULL);
|
||||
} else {
|
||||
UiCustomizeFrontPageBanner (3, TRUE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_BIOS_VERSION), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
}
|
||||
}
|
||||
SmbiosTable = GetSmbiosTableFromType (EntryPoint, SMBIOS_TYPE_BIOS_INFORMATION , 0);
|
||||
if (SmbiosTable.Raw != NULL) {
|
||||
CHAR16 *FwVersion;
|
||||
CHAR16 *TmpBuffer;
|
||||
UINT8 VersionIdx;
|
||||
|
||||
if (Record->Type == SMBIOS_TYPE_SYSTEM_INFORMATION) {
|
||||
Type1Record = (SMBIOS_TABLE_TYPE1 *) Record;
|
||||
StrIndex = Type1Record->ProductName;
|
||||
GetOptionalStringByIndex ((CHAR8*)((UINT8*)Type1Record + Type1Record->Hdr.Length), StrIndex, &NewString);
|
||||
UiCustomizeFrontPageBanner (1, TRUE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_COMPUTER_MODEL), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
}
|
||||
TmpBuffer = AllocateZeroPool (0x60);
|
||||
|
||||
if ((Record->Type == SMBIOS_TYPE_PROCESSOR_INFORMATION) && !FoundCpu) {
|
||||
Type4Record = (SMBIOS_TABLE_TYPE4 *) Record;
|
||||
//
|
||||
// The information in the record should be only valid when the CPU Socket is populated.
|
||||
//
|
||||
if ((Type4Record->Status & SMBIOS_TYPE4_CPU_SOCKET_POPULATED) == SMBIOS_TYPE4_CPU_SOCKET_POPULATED) {
|
||||
StrIndex = Type4Record->ProcessorVersion;
|
||||
GetOptionalStringByIndex ((CHAR8*)((UINT8*)Type4Record + Type4Record->Hdr.Length), StrIndex, &NewString);
|
||||
UiCustomizeFrontPageBanner (2, TRUE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_CPU_MODEL), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
VersionIdx = SmbiosTable.Type0->BiosVersion;
|
||||
GetOptionalStringByIndex ((CHAR8*)((UINT8*)SmbiosTable.Raw + SmbiosTable.Hdr->Length), VersionIdx, &FwVersion);
|
||||
|
||||
ConvertProcessorToString(Type4Record->CurrentSpeed, 6, &NewString);
|
||||
UiCustomizeFrontPageBanner (2, FALSE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_CPU_SPEED), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
StrCatS (TmpBuffer, 0x60 / sizeof (CHAR16), L"Version: ");
|
||||
StrCatS (TmpBuffer, 0x60 / sizeof (CHAR16), FwVersion);
|
||||
|
||||
FoundCpu = TRUE;
|
||||
}
|
||||
}
|
||||
TokenToUpdate = STRING_TOKEN (STR_FRONT_PAGE_BIOS_VERSION);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, TokenToUpdate, TmpBuffer, NULL);
|
||||
|
||||
if ( Record->Type == SMBIOS_TYPE_MEMORY_ARRAY_MAPPED_ADDRESS ) {
|
||||
Type19Record = (SMBIOS_TABLE_TYPE19 *) Record;
|
||||
if (Type19Record->StartingAddress != 0xFFFFFFFF ) {
|
||||
InstalledMemory += RShiftU64(Type19Record->EndingAddress -
|
||||
Type19Record->StartingAddress + 1, 10);
|
||||
} else {
|
||||
InstalledMemory += RShiftU64(Type19Record->ExtendedEndingAddress -
|
||||
Type19Record->ExtendedStartingAddress + 1, 20);
|
||||
}
|
||||
}
|
||||
|
||||
Status = Smbios->GetNext (Smbios, &SmbiosHandle, NULL, &Record, NULL);
|
||||
FreePool (FwVersion);
|
||||
FreePool (TmpBuffer);
|
||||
}
|
||||
|
||||
//
|
||||
// Now update the total installed RAM size
|
||||
//
|
||||
ConvertMemorySizeToString ((UINT32)InstalledMemory, &NewString );
|
||||
UiCustomizeFrontPageBanner (3, FALSE, &NewString);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, STRING_TOKEN (STR_FRONT_PAGE_MEMORY_SIZE), NewString, NULL);
|
||||
FreePool (NewString);
|
||||
SmbiosTable = GetSmbiosTableFromType (EntryPoint, SMBIOS_TYPE_SYSTEM_INFORMATION , 0);
|
||||
if (SmbiosTable.Raw != NULL) {
|
||||
CHAR16 *Manufacturer;
|
||||
CHAR16 *ProductName;
|
||||
CHAR16 *ProductVersion;
|
||||
CHAR16 *Title;
|
||||
CHAR16 *Model;
|
||||
UINT8 ModelIdx;
|
||||
UINT8 ManIdx;
|
||||
UINT8 VersionIdx;
|
||||
|
||||
Title = AllocateZeroPool (0x60);
|
||||
Model = AllocateZeroPool (0x60);
|
||||
|
||||
ManIdx = SmbiosTable.Type1->Manufacturer;
|
||||
ModelIdx = SmbiosTable.Type1->ProductName;
|
||||
|
||||
GetOptionalStringByIndex ((CHAR8*)((UINT8*)SmbiosTable.Raw + SmbiosTable.Hdr->Length), ModelIdx, &ProductName);
|
||||
GetOptionalStringByIndex ((CHAR8*)((UINT8*)SmbiosTable.Raw + SmbiosTable.Hdr->Length), ManIdx, &Manufacturer);
|
||||
|
||||
StrCatS (Title, 0x60 / sizeof (CHAR16), Manufacturer);
|
||||
StrCatS (Title, 0x60 / sizeof (CHAR16), L" ");
|
||||
StrCatS (Title, 0x60 / sizeof (CHAR16), ProductName);
|
||||
|
||||
TokenToUpdate = STRING_TOKEN (STR_FRONT_PAGE_TITLE);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, TokenToUpdate, Title, NULL);
|
||||
|
||||
VersionIdx = SmbiosTable.Type1->Version;
|
||||
GetOptionalStringByIndex ((CHAR8*)((UINT8*)SmbiosTable.Raw + SmbiosTable.Hdr->Length), VersionIdx, &ProductVersion);
|
||||
|
||||
StrCatS (Model, 0x60 / sizeof (CHAR16), L"Model: ");
|
||||
StrCatS (Model, 0x60 / sizeof (CHAR16), ProductVersion);
|
||||
|
||||
TokenToUpdate = STRING_TOKEN (STR_FRONT_PAGE_COMPUTER_MODEL);
|
||||
HiiSetString (gFrontPagePrivate.HiiHandle, TokenToUpdate, Model, NULL);
|
||||
|
||||
FreePool (Model);
|
||||
FreePool (Title);
|
||||
FreePool (ProductVersion);
|
||||
FreePool (ProductName);
|
||||
FreePool (Manufacturer);
|
||||
}
|
||||
|
||||
SmbiosTable = GetSmbiosTableFromType (EntryPoint, SMBIOS_TYPE_SYSTEM_ENCLOSURE, 0);
|
||||
if (SmbiosTable.Raw != NULL) {
|
||||
switch (SmbiosTable.Type3->Type) {
|
||||
//TODO: System76 laptops will always report the laptop chassis type,
|
||||
//but we should probably handle all potential types
|
||||
case MiscChassisTypeLapTop:
|
||||
CheckWebcam = TRUE;
|
||||
break;
|
||||
default:
|
||||
CheckWebcam = FALSE;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
if (CheckWebcam) {
|
||||
WebcamStatus();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
@ -892,6 +1422,8 @@ InitializeUserInterface (
|
||||
UINTN BootTextColumn;
|
||||
UINTN BootTextRow;
|
||||
|
||||
gSystemTable = SystemTable;
|
||||
|
||||
if (!mModeInitialized) {
|
||||
//
|
||||
// After the console is ready, get current video resolution
|
||||
@ -1017,11 +1549,6 @@ UiEntry (
|
||||
|
||||
FreeFrontPage ();
|
||||
|
||||
if (mLanguageString != NULL) {
|
||||
FreePool (mLanguageString);
|
||||
mLanguageString = NULL;
|
||||
}
|
||||
|
||||
//
|
||||
//Will leave browser, check any reset required change is applied? if yes, reset system
|
||||
//
|
||||
@ -1034,10 +1561,6 @@ UiEntry (
|
||||
// user change any option setting which needs a reset to be effective, and the reset will be applied according to the user selection.
|
||||
//
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
/**
|
||||
Record the info that a reset is required.
|
||||
A module boolean variable is used to record whether a reset is required.
|
||||
@ -1052,10 +1575,6 @@ EnableResetRequired (
|
||||
mResetRequired = TRUE;
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
/**
|
||||
Check if user changed any option setting which needs a system reset to be effective.
|
||||
|
||||
@ -1110,4 +1629,3 @@ SetupResetReminder (
|
||||
gRT->ResetSystem (EfiResetCold, EFI_SUCCESS, 0, NULL);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -32,9 +32,11 @@ extern EFI_FORM_BROWSER2_PROTOCOL *gFormBrowser2;
|
||||
//
|
||||
// These are defined as the same with vfr file
|
||||
//
|
||||
#define FRONT_PAGE_FORM_ID 0x1000
|
||||
#define FRONT_PAGE_FORM_ID 0x7600
|
||||
#define FIRMWARE_INFO_FORM_ID 0x7601
|
||||
|
||||
#define LABEL_FRANTPAGE_INFORMATION 0x1000
|
||||
#define LABEL_FRONTPAGE_INFORMATION 0x1000
|
||||
#define LABEL_DEVICES_LIST 0x2000
|
||||
#define LABEL_END 0xffff
|
||||
|
||||
#define FRONT_PAGE_FORMSET_GUID \
|
||||
@ -52,7 +54,6 @@ typedef struct {
|
||||
//
|
||||
EFI_HII_HANDLE HiiHandle;
|
||||
EFI_HANDLE DriverHandle;
|
||||
EFI_STRING_ID *LanguageToken;
|
||||
|
||||
//
|
||||
// Produced protocols
|
||||
@ -210,4 +211,3 @@ ExtractDevicePathFromHiiHandle (
|
||||
);
|
||||
|
||||
#endif // _FRONT_PAGE_H_
|
||||
|
||||
|
@ -29,35 +29,15 @@ UiCustomizeFrontPage (
|
||||
IN VOID *StartOpCodeHandle
|
||||
)
|
||||
{
|
||||
//
|
||||
// Create "Select Language" menu with Oneof opcode.
|
||||
//
|
||||
UiCreateLanguageMenu (HiiHandle, StartOpCodeHandle);
|
||||
|
||||
//
|
||||
// Create empty line.
|
||||
//
|
||||
UiCreateEmptyLine(HiiHandle, StartOpCodeHandle);
|
||||
|
||||
//
|
||||
// Find third party drivers which need to be shown in the front page.
|
||||
//
|
||||
UiListThirdPartyDrivers (HiiHandle, &gEfiIfrFrontPageGuid, NULL, StartOpCodeHandle);
|
||||
|
||||
//
|
||||
// Create empty line.
|
||||
//
|
||||
UiCreateEmptyLine(HiiHandle, StartOpCodeHandle);
|
||||
|
||||
//
|
||||
// Create "Continue" menu.
|
||||
//
|
||||
UiCreateContinueMenu(HiiHandle, StartOpCodeHandle);
|
||||
|
||||
//
|
||||
// Create reset menu.
|
||||
// Find third party drivers which need to be shown in the front page.
|
||||
//
|
||||
UiCreateResetMenu(HiiHandle, StartOpCodeHandle);
|
||||
UiListThirdPartyDrivers (HiiHandle, &gEfiIfrFrontPageGuid, NULL, StartOpCodeHandle);
|
||||
}
|
||||
|
||||
/**
|
||||
@ -96,44 +76,3 @@ UiFrontPageCallbackHandler (
|
||||
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
||||
/**
|
||||
Update the banner string in the front page.
|
||||
|
||||
Current layout for the banner string like below:
|
||||
PS: Totally only 5 lines of banner supported.
|
||||
|
||||
Line 1: Left BannerStr RightBannerStr
|
||||
Line 2: Left BannerStr RightBannerStr
|
||||
Line 3: Left BannerStr RightBannerStr
|
||||
Line 4: Left BannerStr RightBannerStr
|
||||
Line 5: Left BannerStr RightBannerStr
|
||||
<EmptyLine>
|
||||
First menu in front page.
|
||||
...
|
||||
|
||||
@param LineIndex The line index of the banner need to check.
|
||||
@param LeftOrRight The left or right banner need to check.
|
||||
@param BannerStr Banner string need to update.
|
||||
Input the current string and user can update
|
||||
it and return the new string.
|
||||
|
||||
**/
|
||||
VOID
|
||||
UiCustomizeFrontPageBanner (
|
||||
IN UINTN LineIndex,
|
||||
IN BOOLEAN LeftOrRight,
|
||||
IN OUT EFI_STRING *BannerStr
|
||||
)
|
||||
{
|
||||
if ((LineIndex == 5) && LeftOrRight) {
|
||||
// Update STR_CUSTOMIZE_BANNER_LINE5_LEFT
|
||||
if (PcdGetBool(PcdTestKeyUsed)) {
|
||||
if (BannerStr != NULL) {
|
||||
FreePool(*BannerStr);
|
||||
}
|
||||
*BannerStr = HiiGetString(gFrontPagePrivate.HiiHandle, STRING_TOKEN(STR_TEST_KEY_USED), NULL);
|
||||
}
|
||||
}
|
||||
return;
|
||||
}
|
||||
|
@ -9,35 +9,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#ifndef __FRONTPAGE_CUSTOMIZED_UI_H__
|
||||
#define __FRONTPAGE_CUSTOMIZED_UI_H__
|
||||
|
||||
/**
|
||||
Update the banner string in the front page.
|
||||
|
||||
Current layout for the banner string like below:
|
||||
PS: Totally only 5 lines of banner supported.
|
||||
|
||||
Line 1: Left BannerStr RightBannerStr
|
||||
Line 2: Left BannerStr RightBannerStr
|
||||
Line 3: Left BannerStr RightBannerStr
|
||||
Line 4: Left BannerStr RightBannerStr
|
||||
Line 5: Left BannerStr RightBannerStr
|
||||
<EmptyLine>
|
||||
First menu in front page.
|
||||
...
|
||||
|
||||
@param LineIndex The line index of the banner need to check.
|
||||
@param LeftOrRight The left or right banner need to check.
|
||||
@param BannerStr Banner string need to update.
|
||||
Input the current string and user can update
|
||||
it and return the new string.
|
||||
|
||||
**/
|
||||
VOID
|
||||
UiCustomizeFrontPageBanner (
|
||||
IN UINTN LineIndex,
|
||||
IN BOOLEAN LeftOrRight,
|
||||
IN OUT EFI_STRING *BannerStr
|
||||
);
|
||||
|
||||
/**
|
||||
Customize menus in the page.
|
||||
|
||||
|
@ -35,8 +35,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#define UI_HII_DRIVER_LIST_SIZE 0x8
|
||||
|
||||
#define FRONT_PAGE_KEY_CONTINUE 0x1000
|
||||
#define FRONT_PAGE_KEY_RESET 0x1001
|
||||
#define FRONT_PAGE_KEY_LANGUAGE 0x1002
|
||||
#define FRONT_PAGE_KEY_DRIVER 0x2000
|
||||
|
||||
typedef struct {
|
||||
@ -47,112 +45,10 @@ typedef struct {
|
||||
BOOLEAN EmptyLineAfter;
|
||||
} UI_HII_DRIVER_INSTANCE;
|
||||
|
||||
CHAR8 *gLanguageString;
|
||||
EFI_STRING_ID *gLanguageToken;
|
||||
UI_HII_DRIVER_INSTANCE *gHiiDriverList;
|
||||
extern EFI_HII_HANDLE gStringPackHandle;
|
||||
UINT8 gCurrentLanguageIndex;
|
||||
|
||||
|
||||
/**
|
||||
Get next language from language code list (with separator ';').
|
||||
|
||||
If LangCode is NULL, then ASSERT.
|
||||
If Lang is NULL, then ASSERT.
|
||||
|
||||
@param LangCode On input: point to first language in the list. On
|
||||
output: point to next language in the list, or
|
||||
NULL if no more language in the list.
|
||||
@param Lang The first language in the list.
|
||||
|
||||
**/
|
||||
VOID
|
||||
GetNextLanguage (
|
||||
IN OUT CHAR8 **LangCode,
|
||||
OUT CHAR8 *Lang
|
||||
)
|
||||
{
|
||||
UINTN Index;
|
||||
CHAR8 *StringPtr;
|
||||
|
||||
ASSERT (LangCode != NULL);
|
||||
ASSERT (*LangCode != NULL);
|
||||
ASSERT (Lang != NULL);
|
||||
|
||||
Index = 0;
|
||||
StringPtr = *LangCode;
|
||||
while (StringPtr[Index] != 0 && StringPtr[Index] != ';') {
|
||||
Index++;
|
||||
}
|
||||
|
||||
CopyMem (Lang, StringPtr, Index);
|
||||
Lang[Index] = 0;
|
||||
|
||||
if (StringPtr[Index] == ';') {
|
||||
Index++;
|
||||
}
|
||||
*LangCode = StringPtr + Index;
|
||||
}
|
||||
|
||||
/**
|
||||
This function processes the language changes in configuration.
|
||||
|
||||
@param Value A pointer to the data being sent to the original exporting driver.
|
||||
|
||||
|
||||
@retval TRUE The callback successfully handled the action.
|
||||
@retval FALSE The callback not supported in this handler.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
LanguageChangeHandler (
|
||||
IN EFI_IFR_TYPE_VALUE *Value
|
||||
)
|
||||
{
|
||||
CHAR8 *LangCode;
|
||||
CHAR8 *Lang;
|
||||
UINTN Index;
|
||||
EFI_STATUS Status;
|
||||
|
||||
//
|
||||
// Allocate working buffer for RFC 4646 language in supported LanguageString.
|
||||
//
|
||||
Lang = AllocatePool (AsciiStrSize (gLanguageString));
|
||||
ASSERT (Lang != NULL);
|
||||
|
||||
Index = 0;
|
||||
LangCode = gLanguageString;
|
||||
while (*LangCode != 0) {
|
||||
GetNextLanguage (&LangCode, Lang);
|
||||
|
||||
if (Index == Value->u8) {
|
||||
gCurrentLanguageIndex = Value->u8;
|
||||
break;
|
||||
}
|
||||
|
||||
Index++;
|
||||
}
|
||||
|
||||
if (Index == Value->u8) {
|
||||
Status = gRT->SetVariable (
|
||||
L"PlatformLang",
|
||||
&gEfiGlobalVariableGuid,
|
||||
EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS | EFI_VARIABLE_RUNTIME_ACCESS,
|
||||
AsciiStrSize (Lang),
|
||||
Lang
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
FreePool (Lang);
|
||||
return EFI_DEVICE_ERROR;
|
||||
}
|
||||
} else {
|
||||
ASSERT (FALSE);
|
||||
}
|
||||
FreePool (Lang);
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
/**
|
||||
This function processes the results of changes in configuration.
|
||||
|
||||
@ -181,19 +77,12 @@ UiSupportLibCallbackHandler (
|
||||
OUT EFI_STATUS *Status
|
||||
)
|
||||
{
|
||||
if (QuestionId != FRONT_PAGE_KEY_CONTINUE &&
|
||||
QuestionId != FRONT_PAGE_KEY_RESET &&
|
||||
QuestionId != FRONT_PAGE_KEY_LANGUAGE) {
|
||||
if (QuestionId != FRONT_PAGE_KEY_CONTINUE) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (Action == EFI_BROWSER_ACTION_RETRIEVE) {
|
||||
if (QuestionId == FRONT_PAGE_KEY_LANGUAGE) {
|
||||
Value->u8 = gCurrentLanguageIndex;
|
||||
*Status = EFI_SUCCESS;
|
||||
} else {
|
||||
*Status = EFI_UNSUPPORTED;
|
||||
}
|
||||
*Status = EFI_UNSUPPORTED;
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
@ -220,17 +109,6 @@ UiSupportLibCallbackHandler (
|
||||
*ActionRequest = EFI_BROWSER_ACTION_REQUEST_EXIT;
|
||||
break;
|
||||
|
||||
case FRONT_PAGE_KEY_LANGUAGE:
|
||||
*Status = LanguageChangeHandler(Value);
|
||||
break;
|
||||
|
||||
case FRONT_PAGE_KEY_RESET:
|
||||
//
|
||||
// Reset
|
||||
//
|
||||
gRT->ResetSystem (EfiResetCold, EFI_SUCCESS, 0, NULL);
|
||||
*Status = EFI_UNSUPPORTED;
|
||||
|
||||
default:
|
||||
break;
|
||||
}
|
||||
@ -239,156 +117,6 @@ UiSupportLibCallbackHandler (
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
/**
|
||||
Create Select language menu in the front page with oneof opcode.
|
||||
|
||||
@param[in] HiiHandle The hii handle for the Uiapp driver.
|
||||
@param[in] StartOpCodeHandle The opcode handle to save the new opcode.
|
||||
|
||||
**/
|
||||
VOID
|
||||
UiCreateLanguageMenu (
|
||||
IN EFI_HII_HANDLE HiiHandle,
|
||||
IN VOID *StartOpCodeHandle
|
||||
)
|
||||
{
|
||||
CHAR8 *LangCode;
|
||||
CHAR8 *Lang;
|
||||
UINTN LangSize;
|
||||
CHAR8 *CurrentLang;
|
||||
UINTN OptionCount;
|
||||
CHAR16 *StringBuffer;
|
||||
VOID *OptionsOpCodeHandle;
|
||||
UINTN StringSize;
|
||||
EFI_STATUS Status;
|
||||
EFI_HII_STRING_PROTOCOL *HiiString;
|
||||
|
||||
Lang = NULL;
|
||||
StringBuffer = NULL;
|
||||
|
||||
//
|
||||
// Init OpCode Handle and Allocate space for creation of UpdateData Buffer
|
||||
//
|
||||
OptionsOpCodeHandle = HiiAllocateOpCodeHandle ();
|
||||
ASSERT (OptionsOpCodeHandle != NULL);
|
||||
|
||||
GetEfiGlobalVariable2 (L"PlatformLang", (VOID**)&CurrentLang, NULL);
|
||||
|
||||
//
|
||||
// Get Support language list from variable.
|
||||
//
|
||||
GetEfiGlobalVariable2 (L"PlatformLangCodes", (VOID**)&gLanguageString, NULL);
|
||||
if (gLanguageString == NULL) {
|
||||
gLanguageString = AllocateCopyPool (
|
||||
AsciiStrSize ((CHAR8 *) PcdGetPtr (PcdUefiVariableDefaultPlatformLangCodes)),
|
||||
(CHAR8 *) PcdGetPtr (PcdUefiVariableDefaultPlatformLangCodes)
|
||||
);
|
||||
ASSERT (gLanguageString != NULL);
|
||||
}
|
||||
|
||||
if (gLanguageToken == NULL) {
|
||||
//
|
||||
// Count the language list number.
|
||||
//
|
||||
LangCode = gLanguageString;
|
||||
Lang = AllocatePool (AsciiStrSize (gLanguageString));
|
||||
ASSERT (Lang != NULL);
|
||||
|
||||
OptionCount = 0;
|
||||
while (*LangCode != 0) {
|
||||
GetNextLanguage (&LangCode, Lang);
|
||||
OptionCount ++;
|
||||
}
|
||||
|
||||
//
|
||||
// Allocate extra 1 as the end tag.
|
||||
//
|
||||
gLanguageToken = AllocateZeroPool ((OptionCount + 1) * sizeof (EFI_STRING_ID));
|
||||
ASSERT (gLanguageToken != NULL);
|
||||
|
||||
Status = gBS->LocateProtocol (&gEfiHiiStringProtocolGuid, NULL, (VOID **) &HiiString);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
LangCode = gLanguageString;
|
||||
OptionCount = 0;
|
||||
while (*LangCode != 0) {
|
||||
GetNextLanguage (&LangCode, Lang);
|
||||
|
||||
StringSize = 0;
|
||||
Status = HiiString->GetString (HiiString, Lang, HiiHandle, PRINTABLE_LANGUAGE_NAME_STRING_ID, StringBuffer, &StringSize, NULL);
|
||||
if (Status == EFI_BUFFER_TOO_SMALL) {
|
||||
StringBuffer = AllocateZeroPool (StringSize);
|
||||
ASSERT (StringBuffer != NULL);
|
||||
Status = HiiString->GetString (HiiString, Lang, HiiHandle, PRINTABLE_LANGUAGE_NAME_STRING_ID, StringBuffer, &StringSize, NULL);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
}
|
||||
|
||||
if (EFI_ERROR (Status)) {
|
||||
LangSize = AsciiStrSize (Lang);
|
||||
StringBuffer = AllocatePool (LangSize * sizeof (CHAR16));
|
||||
ASSERT (StringBuffer != NULL);
|
||||
AsciiStrToUnicodeStrS (Lang, StringBuffer, LangSize);
|
||||
}
|
||||
|
||||
ASSERT (StringBuffer != NULL);
|
||||
gLanguageToken[OptionCount] = HiiSetString (HiiHandle, 0, StringBuffer, NULL);
|
||||
FreePool (StringBuffer);
|
||||
|
||||
OptionCount++;
|
||||
}
|
||||
}
|
||||
|
||||
ASSERT (gLanguageToken != NULL);
|
||||
LangCode = gLanguageString;
|
||||
OptionCount = 0;
|
||||
if (Lang == NULL) {
|
||||
Lang = AllocatePool (AsciiStrSize (gLanguageString));
|
||||
ASSERT (Lang != NULL);
|
||||
}
|
||||
while (*LangCode != 0) {
|
||||
GetNextLanguage (&LangCode, Lang);
|
||||
|
||||
if (CurrentLang != NULL && AsciiStrCmp (Lang, CurrentLang) == 0) {
|
||||
HiiCreateOneOfOptionOpCode (
|
||||
OptionsOpCodeHandle,
|
||||
gLanguageToken[OptionCount],
|
||||
EFI_IFR_OPTION_DEFAULT,
|
||||
EFI_IFR_NUMERIC_SIZE_1,
|
||||
(UINT8) OptionCount
|
||||
);
|
||||
gCurrentLanguageIndex = (UINT8) OptionCount;
|
||||
} else {
|
||||
HiiCreateOneOfOptionOpCode (
|
||||
OptionsOpCodeHandle,
|
||||
gLanguageToken[OptionCount],
|
||||
0,
|
||||
EFI_IFR_NUMERIC_SIZE_1,
|
||||
(UINT8) OptionCount
|
||||
);
|
||||
}
|
||||
|
||||
OptionCount++;
|
||||
}
|
||||
|
||||
if (CurrentLang != NULL) {
|
||||
FreePool (CurrentLang);
|
||||
}
|
||||
FreePool (Lang);
|
||||
|
||||
HiiCreateOneOfOpCode (
|
||||
StartOpCodeHandle,
|
||||
FRONT_PAGE_KEY_LANGUAGE,
|
||||
0,
|
||||
0,
|
||||
STRING_TOKEN (STR_LANGUAGE_SELECT),
|
||||
STRING_TOKEN (STR_LANGUAGE_SELECT_HELP),
|
||||
EFI_IFR_FLAG_CALLBACK,
|
||||
EFI_IFR_NUMERIC_SIZE_1,
|
||||
OptionsOpCodeHandle,
|
||||
NULL
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
Create continue menu in the front page.
|
||||
|
||||
@ -405,8 +133,8 @@ UiCreateContinueMenu (
|
||||
HiiCreateActionOpCode (
|
||||
StartOpCodeHandle,
|
||||
FRONT_PAGE_KEY_CONTINUE,
|
||||
STRING_TOKEN (STR_CONTINUE_PROMPT),
|
||||
STRING_TOKEN (STR_CONTINUE_PROMPT),
|
||||
STRING_TOKEN (STR_BOOT_DEFAULT_PROMPT),
|
||||
STRING_TOKEN (STR_BOOT_DEFAULT_HELP),
|
||||
EFI_IFR_FLAG_CALLBACK,
|
||||
0
|
||||
);
|
||||
@ -425,30 +153,7 @@ UiCreateEmptyLine (
|
||||
IN VOID *StartOpCodeHandle
|
||||
)
|
||||
{
|
||||
HiiCreateSubTitleOpCode (StartOpCodeHandle, STRING_TOKEN (STR_NULL_STRING), 0, 0, 0);
|
||||
}
|
||||
|
||||
/**
|
||||
Create Reset menu in the front page.
|
||||
|
||||
@param[in] HiiHandle The hii handle for the Uiapp driver.
|
||||
@param[in] StartOpCodeHandle The opcode handle to save the new opcode.
|
||||
|
||||
**/
|
||||
VOID
|
||||
UiCreateResetMenu (
|
||||
IN EFI_HII_HANDLE HiiHandle,
|
||||
IN VOID *StartOpCodeHandle
|
||||
)
|
||||
{
|
||||
HiiCreateActionOpCode (
|
||||
StartOpCodeHandle,
|
||||
FRONT_PAGE_KEY_RESET,
|
||||
STRING_TOKEN (STR_RESET_STRING),
|
||||
STRING_TOKEN (STR_RESET_STRING),
|
||||
EFI_IFR_FLAG_CALLBACK,
|
||||
0
|
||||
);
|
||||
HiiCreateSubTitleOpCode (StartOpCodeHandle, STRING_TOKEN (STR_EMPTY_STRING), 0, 0, 0);
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -35,32 +35,6 @@ UiCreateEmptyLine (
|
||||
IN VOID *StartOpCodeHandle
|
||||
);
|
||||
|
||||
/**
|
||||
Create Select language menu in the front page with oneof opcode.
|
||||
|
||||
@param[in] HiiHandle The hii handle for the Uiapp driver.
|
||||
@param[in] StartOpCodeHandle The opcode handle to save the new opcode.
|
||||
|
||||
**/
|
||||
VOID
|
||||
UiCreateLanguageMenu (
|
||||
IN EFI_HII_HANDLE HiiHandle,
|
||||
IN VOID *StartOpCodeHandle
|
||||
);
|
||||
|
||||
/**
|
||||
Create Reset menu.
|
||||
|
||||
@param[in] HiiHandle The hii handle for the Uiapp driver.
|
||||
@param[in] StartOpCodeHandle The opcode handle to save the new opcode.
|
||||
|
||||
**/
|
||||
VOID
|
||||
UiCreateResetMenu (
|
||||
IN EFI_HII_HANDLE HiiHandle,
|
||||
IN VOID *StartOpCodeHandle
|
||||
);
|
||||
|
||||
/**
|
||||
Rename the driver name if necessary.
|
||||
|
||||
|
@ -10,59 +10,19 @@
|
||||
/=#
|
||||
|
||||
#langdef en-US "English"
|
||||
#langdef fr-FR "Français"
|
||||
#langdef en "Standard English"
|
||||
#langdef fr "Standard Français"
|
||||
|
||||
#string STR_FRONT_PAGE_TITLE #language en-US "Front Page"
|
||||
#language fr-FR "Front Page"
|
||||
#string STR_FRONT_PAGE_COMPUTER_MODEL #language en-US ""
|
||||
#language fr-FR ""
|
||||
#string STR_FRONT_PAGE_CPU_MODEL #language en-US ""
|
||||
#language fr-FR ""
|
||||
#string STR_FRONT_PAGE_CPU_SPEED #language en-US ""
|
||||
#language fr-FR ""
|
||||
#string STR_FRONT_PAGE_MEMORY_SIZE #language en-US ""
|
||||
#language fr-FR ""
|
||||
#string STR_FRONT_PAGE_BIOS_VERSION #language en-US ""
|
||||
#language fr-FR ""
|
||||
#string STR_FRONT_PAGE_BANNER_0_LEFT #language en-US "Wonder Computer Model 1000Z Manufactured by Intel®"
|
||||
#language fr-FR "Demander le Modèle d'Ordinateur 1000Z A Fabriqué par Intel®"
|
||||
#string STR_FRONT_PAGE_BANNER_0_RIGHT #language en-US "OK"
|
||||
#language fr-FR "Bon"
|
||||
#string STR_FRONT_PAGE_BANNER_1_LEFT #language en-US "2 Pentium® X Xeon processors running at 800Thz"
|
||||
#language fr-FR "2 processeurs Pentium® X Xeon tournants à 800Thz"
|
||||
#string STR_FRONT_PAGE_BANNER_1_RIGHT #language en-US "24 TB System RAM"
|
||||
#language fr-FR "24 TB RAM de Système"
|
||||
#string STR_FRONT_PAGE_BANNER_2_LEFT #language en-US "ACME® EFI BIOS Version 13.5 Release 1039.92"
|
||||
#language fr-FR "ACME® EFI BIOS Version 13.5 Release 1039.92"
|
||||
#string STR_FRONT_PAGE_BANNER_3_LEFT #language en-US "Serial Number: 1Z123456789MARMAR (Need SMBIOS entries)"
|
||||
#language fr-FR "Numéro de série: 1Z123456789MARMAR (Les entrées de SMBIOS de besoin)"
|
||||
#string STR_CONTINUE_PROMPT #language en-US "Continue"
|
||||
#language fr-FR "Continuer"
|
||||
#string STR_CONTINUE_HELP #language en-US "This selection will direct the system to continue to booting process"
|
||||
#language fr-FR "Cette sélection dirigera le système pour continuer au processus d'amorçage"
|
||||
#string STR_LANGUAGE_SELECT #language en-US "Select Language"
|
||||
#language fr-FR "Choisir la Langue"
|
||||
#string STR_LANGUAGE_SELECT_HELP #language en-US "This is the option one adjusts to change the language for the current system"
|
||||
#language fr-FR "Ceci est l'option qu'on ajuste pour changer la langue pour le système actuel"
|
||||
#string STR_FRONT_PAGE_COMPUTER_MODEL #language en-US "<model>"
|
||||
#string STR_FRONT_PAGE_BIOS_VERSION #language en-US "<bios>"
|
||||
#string STR_FIRMWARE_INFO #language en-US "Firmware Configuration Information"
|
||||
#string STR_BOOT_DEFAULT_PROMPT #language en-US "Boot Default"
|
||||
#string STR_BOOT_DEFAULT_HELP #language en-US "Boot the default entry"
|
||||
#string STR_MISSING_STRING #language en-US "Missing String"
|
||||
#language fr-FR "Missing String"
|
||||
#string STR_NO_BOOTABLE_MEDIA #language en-US ""
|
||||
#string STR_WEBCAM_STATUS #language en-US ""
|
||||
#string STR_EMPTY_STRING #language en-US ""
|
||||
#language fr-FR ""
|
||||
#string STR_RESET_STRING #language en-US "Reset"
|
||||
#language fr-FR "Reset"
|
||||
#string STR_RESET_STRING_HELP #language en-US "Reset the current setting."
|
||||
#language fr-FR "Reset the current setting."
|
||||
#string STR_CUSTOMIZE_BANNER_LINE4_LEFT #language en-US ""
|
||||
#language fr-FR ""
|
||||
#string STR_CUSTOMIZE_BANNER_LINE4_RIGHT #language en-US ""
|
||||
#language fr-FR ""
|
||||
#string STR_CUSTOMIZE_BANNER_LINE5_LEFT #language en-US ""
|
||||
#language fr-FR ""
|
||||
#string STR_CUSTOMIZE_BANNER_LINE5_RIGHT #language en-US ""
|
||||
#language fr-FR ""
|
||||
#string STR_TEST_KEY_USED #language en-US "WARNING: Test key detected."
|
||||
#language fr-FR "WARNING: Test key detected."
|
||||
#string STR_NULL_STRING #language en-US " "
|
||||
#language fr-FR " "
|
||||
#string STR_VIRTUALIZATION #language en-US ""
|
||||
#string STR_VIRTUALIZATION_STATUS #language en-US ""
|
||||
#string STR_IOMMU_STATUS #language en-US ""
|
||||
#string STR_TPM_STATUS #language en-US ""
|
||||
#string STR_ME_STATUS #language en-US ""
|
||||
|
@ -9,72 +9,61 @@
|
||||
|
||||
#define FORMSET_GUID { 0x9e0c30bc, 0x3f06, 0x4ba6, 0x82, 0x88, 0x9, 0x17, 0x9b, 0x85, 0x5d, 0xbe }
|
||||
|
||||
#define FRONT_PAGE_FORM_ID 0x1000
|
||||
#define FRONT_PAGE_FORM_ID 0x7600
|
||||
#define FIRMWARE_INFO_FORM_ID 0x7601
|
||||
|
||||
#define LABEL_FRANTPAGE_INFORMATION 0x1000
|
||||
#define LABEL_FRONTPAGE_INFORMATION 0x1000
|
||||
#define LABEL_DEVICES_LIST 0x2000
|
||||
#define LABEL_END 0xffff
|
||||
|
||||
formset
|
||||
guid = FORMSET_GUID,
|
||||
title = STRING_TOKEN(STR_FRONT_PAGE_TITLE),
|
||||
help = STRING_TOKEN(STR_EMPTY_STRING ),
|
||||
guid = FORMSET_GUID,
|
||||
title = STRING_TOKEN(STR_FRONT_PAGE_TITLE),
|
||||
help = STRING_TOKEN(STR_EMPTY_STRING),
|
||||
classguid = FORMSET_GUID,
|
||||
|
||||
form formid = FRONT_PAGE_FORM_ID,
|
||||
title = STRING_TOKEN(STR_FRONT_PAGE_TITLE);
|
||||
title = STRING_TOKEN(STR_FRONT_PAGE_TITLE);
|
||||
|
||||
banner
|
||||
title = STRING_TOKEN(STR_FRONT_PAGE_COMPUTER_MODEL),
|
||||
line 1,
|
||||
align left;
|
||||
subtitle text = STRING_TOKEN(STR_FRONT_PAGE_COMPUTER_MODEL);
|
||||
subtitle text = STRING_TOKEN(STR_FRONT_PAGE_BIOS_VERSION);
|
||||
subtitle text = STRING_TOKEN(STR_EMPTY_STRING);
|
||||
|
||||
banner
|
||||
title = STRING_TOKEN(STR_FRONT_PAGE_CPU_MODEL),
|
||||
line 2,
|
||||
align left;
|
||||
|
||||
banner
|
||||
title = STRING_TOKEN(STR_FRONT_PAGE_CPU_SPEED),
|
||||
line 2,
|
||||
align right;
|
||||
|
||||
banner
|
||||
title = STRING_TOKEN(STR_FRONT_PAGE_BIOS_VERSION),
|
||||
line 3,
|
||||
align left;
|
||||
|
||||
banner
|
||||
title = STRING_TOKEN(STR_FRONT_PAGE_MEMORY_SIZE),
|
||||
line 3,
|
||||
align right;
|
||||
|
||||
banner
|
||||
title = STRING_TOKEN(STR_CUSTOMIZE_BANNER_LINE4_LEFT),
|
||||
line 4,
|
||||
align left;
|
||||
|
||||
banner
|
||||
title = STRING_TOKEN(STR_CUSTOMIZE_BANNER_LINE4_RIGHT),
|
||||
line 4,
|
||||
align right;
|
||||
|
||||
banner
|
||||
title = STRING_TOKEN(STR_CUSTOMIZE_BANNER_LINE5_LEFT),
|
||||
line 5,
|
||||
align left;
|
||||
|
||||
banner
|
||||
title = STRING_TOKEN(STR_CUSTOMIZE_BANNER_LINE5_RIGHT),
|
||||
line 5,
|
||||
align right;
|
||||
|
||||
label LABEL_FRANTPAGE_INFORMATION;
|
||||
label LABEL_FRONTPAGE_INFORMATION;
|
||||
//
|
||||
// This is where we will dynamically add a Action type op-code to show
|
||||
// the platform information.
|
||||
//
|
||||
label LABEL_END;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_EMPTY_STRING);
|
||||
|
||||
label LABEL_DEVICES_LIST;
|
||||
label LABEL_END;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_EMPTY_STRING);
|
||||
|
||||
goto FIRMWARE_INFO_FORM_ID,
|
||||
prompt = STRING_TOKEN(STR_FIRMWARE_INFO),
|
||||
help = STRING_TOKEN(STR_EMPTY_STRING);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_EMPTY_STRING);
|
||||
subtitle text = STRING_TOKEN(STR_NO_BOOTABLE_MEDIA);
|
||||
subtitle text = STRING_TOKEN(STR_WEBCAM_STATUS);
|
||||
|
||||
endform;
|
||||
|
||||
form formid = FIRMWARE_INFO_FORM_ID,
|
||||
title = STRING_TOKEN(STR_FIRMWARE_INFO);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_VIRTUALIZATION);
|
||||
subtitle text = STRING_TOKEN(STR_VIRTUALIZATION_STATUS);
|
||||
subtitle text = STRING_TOKEN(STR_IOMMU_STATUS);
|
||||
subtitle text = STRING_TOKEN(STR_EMPTY_STRING);
|
||||
subtitle text = STRING_TOKEN(STR_TPM_STATUS);
|
||||
subtitle text = STRING_TOKEN(STR_EMPTY_STRING);
|
||||
subtitle text = STRING_TOKEN(STR_ME_STATUS);
|
||||
subtitle text = STRING_TOKEN(STR_EMPTY_STRING);
|
||||
endform;
|
||||
|
||||
endformset;
|
||||
|
@ -56,8 +56,11 @@
|
||||
UefiBootManagerLib
|
||||
|
||||
[Guids]
|
||||
gEfiAcpiTableGuid ## CONSUMES ## GUID
|
||||
gEfiIfrTianoGuid ## CONSUMES ## GUID (Extended IFR Guid Opcode)
|
||||
gEfiIfrFrontPageGuid ## CONSUMES ## GUID
|
||||
gEfiSmbiosTableGuid ## CONSUMES ## GUID
|
||||
gEfiHiiPlatformSetupFormsetGuid ## CONSUMES ## GUID
|
||||
|
||||
[Protocols]
|
||||
gEfiSmbiosProtocolGuid ## CONSUMES
|
||||
|
@ -1709,13 +1709,7 @@ InitKeyboard (
|
||||
//
|
||||
// wait for BAT completion code
|
||||
//
|
||||
mWaitForValueTimeOut = KEYBOARD_BAT_TIMEOUT;
|
||||
|
||||
Status = KeyboardWaitForValue (ConsoleIn, KEYBOARD_8048_RETURN_8042_BAT_SUCCESS);
|
||||
if (EFI_ERROR (Status)) {
|
||||
KeyboardError (ConsoleIn, L"Keyboard self test failed!\n\r");
|
||||
goto Done;
|
||||
}
|
||||
KeyboardWaitForValue (ConsoleIn, KEYBOARD_8048_RETURN_8042_BAT_SUCCESS);
|
||||
|
||||
mWaitForValueTimeOut = KEYBOARD_WAITFORVALUE_TIMEOUT;
|
||||
|
||||
|
@ -521,15 +521,34 @@ EmmcTuningClkForHs200 (
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
if(BhtHostPciSupport(PciIo)) {
|
||||
//set data transfer with 4bit
|
||||
Status = SdMmcHcSetBusWidth (PciIo, Slot, 4);
|
||||
//enable hardware tuning
|
||||
HostCtrl2 = (UINT8)(~0x10);
|
||||
Status = SdMmcHcAndMmio (PciIo, Slot, 0x110,sizeof (HostCtrl2), &HostCtrl2);
|
||||
|
||||
Status = EmmcSendTuningBlk (PassThru, Slot, 4);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "EmmcTuningClkForHs200: Send tuning block fails with %r\n", Status));
|
||||
return Status;
|
||||
}
|
||||
}
|
||||
|
||||
//
|
||||
// Ask the device to send a sequence of tuning blocks till the tuning procedure is done.
|
||||
//
|
||||
Retry = 0;
|
||||
do {
|
||||
Status = EmmcSendTuningBlk (PassThru, Slot, BusWidth);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "EmmcTuningClkForHs200: Send tuning block fails with %r\n", Status));
|
||||
return Status;
|
||||
if(!BhtHostPciSupport(PciIo)) {
|
||||
Status = EmmcSendTuningBlk (PassThru, Slot, BusWidth);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "EmmcTuningClkForHs200: Send tuning block fails with %r\n", Status));
|
||||
return Status;
|
||||
}
|
||||
} else {
|
||||
gBS->Stall(5000);
|
||||
}
|
||||
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, SD_MMC_HC_HOST_CTRL2, TRUE, sizeof (HostCtrl2), &HostCtrl2);
|
||||
@ -542,6 +561,10 @@ EmmcTuningClkForHs200 (
|
||||
}
|
||||
|
||||
if ((HostCtrl2 & (BIT6 | BIT7)) == BIT7) {
|
||||
if(BhtHostPciSupport(PciIo)) {
|
||||
//set data transfer with default
|
||||
Status = SdMmcHcSetBusWidth (PciIo, Slot, BusWidth);
|
||||
}
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
} while (++Retry < 40);
|
||||
@ -874,9 +897,53 @@ EmmcSwitchToHS200 (
|
||||
return Status;
|
||||
}
|
||||
|
||||
Status = EmmcSwitchBusTiming (PciIo, PassThru, Slot, Rca, BusMode->DriverStrength, BusMode->BusTiming, BusMode->ClockFreq);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
if (BhtHostPciSupport(PciIo)){
|
||||
BusMode->BusTiming = SdMmcMmcHs200;
|
||||
Status = EmmcSwitchBusTiming (PciIo, PassThru, Slot, Rca, BusMode->DriverStrength,
|
||||
BusMode->BusTiming, BusMode->ClockFreq);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
Status = SdMmcHcWaitMmioSet (
|
||||
PciIo,
|
||||
Slot,
|
||||
0x1cc,
|
||||
sizeof (Rca),
|
||||
BIT14,
|
||||
BIT14,
|
||||
SD_MMC_HC_GENERIC_TIMEOUT
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
//Wait 2nd Card Detect debounce Finished by wait twice of debounce max time
|
||||
UINT32 value32;
|
||||
while (1) {
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, SD_MMC_HC_PRESENT_STATE, TRUE, sizeof(value32), &value32);
|
||||
if (((value32 >> 18) & 0x01) == ((value32 >> 16) & 0x01)) {
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
Status = SdMmcHcWaitMmioSet (
|
||||
PciIo,
|
||||
Slot,
|
||||
0x1cc,
|
||||
sizeof (Rca),
|
||||
BIT11,
|
||||
BIT11,
|
||||
SD_MMC_CLOCK_STABLE_TIMEOUT
|
||||
);
|
||||
if (EFI_ERROR(Status)) {
|
||||
return Status;
|
||||
}
|
||||
} else {
|
||||
Status = EmmcSwitchBusTiming (PciIo, PassThru, Slot, Rca, BusMode->DriverStrength, BusMode->BusTiming, BusMode->ClockFreq);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
}
|
||||
|
||||
Status = EmmcTuningClkForHs200 (PciIo, PassThru, Slot, BusMode->BusWidth);
|
||||
@ -1263,10 +1330,89 @@ EmmcSetBusMode (
|
||||
DEBUG ((DEBUG_INFO, "EmmcSetBusMode: Target bus mode: timing = %d, width = %d, clock freq = %d, driver strength = %d\n",
|
||||
BusMode.BusTiming, BusMode.BusWidth, BusMode.ClockFreq, BusMode.DriverStrength.Emmc));
|
||||
|
||||
if (BhtHostPciSupport(PciIo)) {
|
||||
UINT8 EmmcVar;
|
||||
UINTN EmmcVarSize;
|
||||
Status = gRT->GetVariable (
|
||||
L"EMMC_FORCE_CARD_MODE",
|
||||
&gEfiGenericVariableGuid,
|
||||
NULL,
|
||||
&EmmcVarSize,
|
||||
&EmmcVar
|
||||
);
|
||||
if (!EFI_ERROR(Status) && EmmcVar <= 2) {
|
||||
if (EmmcVar == 2) {
|
||||
BusMode.BusTiming = SdMmcMmcHs200;
|
||||
BusMode.ClockFreq = 200;
|
||||
} else if (EmmcVar == 1) {
|
||||
BusMode.BusTiming = SdMmcMmcHs200;
|
||||
BusMode.ClockFreq = 100;
|
||||
} else {
|
||||
BusMode.BusTiming = SdMmcMmcHsSdr;
|
||||
BusMode.ClockFreq = 52;
|
||||
}
|
||||
} else {
|
||||
BusMode.BusTiming = SdMmcMmcHsSdr;
|
||||
BusMode.ClockFreq = 52;
|
||||
}
|
||||
}
|
||||
|
||||
if (BusMode.BusTiming == SdMmcMmcHs400) {
|
||||
//
|
||||
// Execute HS400 timing switch procedure
|
||||
//
|
||||
Status = EmmcSwitchToHS400 (PciIo, PassThru, Slot, Rca, &BusMode);
|
||||
} else if (BusMode.BusTiming == SdMmcMmcHs200) {
|
||||
//
|
||||
// Execute HS200 timing switch procedure
|
||||
//
|
||||
Status = EmmcSwitchToHS200 (PciIo, PassThru, Slot, Rca, &BusMode);
|
||||
|
||||
if (EFI_ERROR(Status)) {
|
||||
if (BhtHostPciSupport(PciIo)) {
|
||||
UINT32 val32;
|
||||
UINT16 EmmcVar;
|
||||
UINTN EmmcVarSize;
|
||||
#if !defined(HS100_ALLPASS_PHASE) || HS100_ALLPASS_PHASE > 10 || HS100_ALLPASS_PHASE < 0
|
||||
#error "HS100_ALLPASS_PHASE is undefined or value is invalid"
|
||||
#else
|
||||
val32 = PciBhtRead32(PciIo, 0x300);
|
||||
val32 &= 0xFF0FFFFF;
|
||||
EmmcVarSize = sizeof(EmmcVar);
|
||||
Status = gRT->GetVariable (
|
||||
L"EMMC_HS100_ALLPASS_PHASE",
|
||||
&gEfiGenericVariableGuid,
|
||||
NULL,
|
||||
&EmmcVarSize,
|
||||
&EmmcVar
|
||||
);
|
||||
if (EFI_ERROR(Status) || EmmcVar > 10)
|
||||
EmmcVar = HS100_ALLPASS_PHASE;
|
||||
val32 |= (EmmcVar << 20);
|
||||
PciBhtWrite32(PciIo, 0x300, 0x21000033 | val32);
|
||||
#endif
|
||||
BusMode.ClockFreq = 100;
|
||||
|
||||
SdMmcHcRwMmio (PciIo, Slot, 0x3C, TRUE, sizeof(val32), &val32);
|
||||
val32 &= ~BIT22;
|
||||
SdMmcHcRwMmio (PciIo, Slot, 0x3C, FALSE, sizeof(val32), &val32);
|
||||
val32 = (BIT26 | BIT25);
|
||||
SdMmcHcOrMmio (PciIo, Slot, 0x2C, sizeof(val32), &val32);
|
||||
|
||||
Status = EmmcSwitchToHS200 (PciIo, PassThru, Slot, Rca, &BusMode);
|
||||
if (EFI_ERROR(Status)) {
|
||||
if (((ExtCsd.DeviceType & BIT1) != 0) && (Private->Capability[Slot].HighSpeed != 0)) {
|
||||
BusMode.BusTiming = SdMmcMmcHsSdr;
|
||||
BusMode.ClockFreq = 52;
|
||||
Status = EmmcSwitchToHighSpeed (PciIo, PassThru, Slot, Rca, &BusMode);
|
||||
} else if (((ExtCsd.DeviceType & BIT0) != 0) && (Private->Capability[Slot].HighSpeed != 0)) {
|
||||
BusMode.BusTiming = SdMmcMmcHsSdr;
|
||||
BusMode.ClockFreq = 26;
|
||||
Status = EmmcSwitchToHighSpeed (PciIo, PassThru, Slot, Rca, &BusMode);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
} else {
|
||||
//
|
||||
// Note that EmmcSwitchToHighSpeed is also called for SdMmcMmcLegacy
|
||||
|
@ -305,6 +305,13 @@ SdMmcPciHcEnumerateDevice (
|
||||
continue;
|
||||
}
|
||||
|
||||
if (BhtHostPciSupport(Private->PciIo)) {
|
||||
Status = SdMmcHcGetCapability (Private->PciIo, Slot, &Private->Capability[Slot]);
|
||||
if (EFI_ERROR (Status)) {
|
||||
continue;
|
||||
}
|
||||
}
|
||||
|
||||
Private->Slot[Slot].MediaPresent = TRUE;
|
||||
Private->Slot[Slot].Initialized = TRUE;
|
||||
RoutineNum = sizeof (mCardTypeDetectRoutineTable) / sizeof (CARD_TYPE_DETECT_ROUTINE);
|
||||
@ -321,6 +328,7 @@ SdMmcPciHcEnumerateDevice (
|
||||
// This card doesn't get initialized correctly.
|
||||
//
|
||||
if (Index == RoutineNum) {
|
||||
DEBUG ((DEBUG_INFO, "Load driver failure\n"));
|
||||
Private->Slot[Slot].Initialized = FALSE;
|
||||
}
|
||||
|
||||
@ -541,6 +549,8 @@ SdMmcPciHcDriverBindingStart (
|
||||
UINT32 RoutineNum;
|
||||
BOOLEAN MediaPresent;
|
||||
BOOLEAN Support64BitDma;
|
||||
UINT16 IntStatus;
|
||||
UINT32 value;
|
||||
|
||||
DEBUG ((DEBUG_INFO, "SdMmcPciHcDriverBindingStart: Start\n"));
|
||||
|
||||
@ -735,6 +745,13 @@ SdMmcPciHcDriverBindingStart (
|
||||
continue;
|
||||
}
|
||||
|
||||
if (BhtHostPciSupport(PciIo)) {
|
||||
Status = SdMmcHcGetCapability (PciIo, Slot, &Private->Capability[Slot]);
|
||||
if (EFI_ERROR (Status)) {
|
||||
continue;
|
||||
}
|
||||
}
|
||||
|
||||
Private->Slot[Slot].MediaPresent = TRUE;
|
||||
Private->Slot[Slot].Initialized = TRUE;
|
||||
RoutineNum = sizeof (mCardTypeDetectRoutineTable) / sizeof (CARD_TYPE_DETECT_ROUTINE);
|
||||
@ -751,9 +768,25 @@ SdMmcPciHcDriverBindingStart (
|
||||
// This card doesn't get initialized correctly.
|
||||
//
|
||||
if (Index == RoutineNum) {
|
||||
DEBUG ((DEBUG_INFO, "Load driver failure\n"));
|
||||
Private->Slot[Slot].Initialized = FALSE;
|
||||
}
|
||||
}
|
||||
if (BhtHostPciSupport(Private->PciIo)) {
|
||||
SdMmcHcRwMmio (Private->PciIo,0,0x110,TRUE,sizeof (value),&value);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,0x114,TRUE,sizeof (value),&value);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,0x1a8,TRUE,sizeof (value),&value);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,0x1ac,TRUE,sizeof (value),&value);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,0x1B0,TRUE,sizeof (value),&value);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,0x1CC,TRUE,sizeof (value),&value);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,0x040,TRUE,sizeof (value),&value);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,SD_MMC_HC_PRESENT_STATE,TRUE,sizeof (value),&value);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,SD_MMC_HC_HOST_CTRL1,TRUE,sizeof (IntStatus),&IntStatus);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,SD_MMC_HC_CLOCK_CTRL,TRUE,sizeof (IntStatus),&IntStatus);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,SD_MMC_HC_TIMEOUT_CTRL,TRUE,sizeof (IntStatus),&IntStatus);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,SD_MMC_HC_NOR_INT_STS,TRUE,sizeof (value),&value);
|
||||
SdMmcHcRwMmio (Private->PciIo,0,SD_MMC_HC_HOST_CTRL2,TRUE,sizeof (IntStatus),&IntStatus);
|
||||
}
|
||||
|
||||
//
|
||||
// Enable 64-bit DMA support in the PCI layer if this controller
|
||||
|
@ -20,6 +20,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#include <Library/UefiDriverEntryPoint.h>
|
||||
#include <Library/DebugLib.h>
|
||||
#include <Library/UefiBootServicesTableLib.h>
|
||||
#include <Library/UefiRuntimeServicesTableLib.h>
|
||||
#include <Library/BaseMemoryLib.h>
|
||||
#include <Library/MemoryAllocationLib.h>
|
||||
#include <Library/UefiLib.h>
|
||||
@ -33,6 +34,8 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#include <Protocol/SdMmcOverride.h>
|
||||
#include <Protocol/SdMmcPassThru.h>
|
||||
|
||||
#include <Guid/DebugMask.h>
|
||||
|
||||
#include "SdMmcPciHci.h"
|
||||
|
||||
extern EFI_COMPONENT_NAME_PROTOCOL gSdMmcPciHcComponentName;
|
||||
@ -46,10 +49,16 @@ extern EDKII_SD_MMC_OVERRIDE *mOverride;
|
||||
#define SD_MMC_HC_PRIVATE_FROM_THIS(a) \
|
||||
CR(a, SD_MMC_HC_PRIVATE_DATA, PassThru, SD_MMC_HC_PRIVATE_SIGNATURE)
|
||||
|
||||
#define HOST_CLK_DRIVE_STRENGTH 2
|
||||
#define HOST_DAT_DRIVE_STRENGTH 2
|
||||
#define HS200_ALLPASS_PHASE 0
|
||||
#define HS100_ALLPASS_PHASE 6
|
||||
|
||||
//
|
||||
// Generic time out value, 1 microsecond as unit.
|
||||
//
|
||||
#define SD_MMC_HC_GENERIC_TIMEOUT 1 * 1000 * 1000
|
||||
#define SD_MMC_HC_GENERIC_TIMEOUT 1 * 1000 * 100
|
||||
#define SD_MMC_CLOCK_STABLE_TIMEOUT 3 * 1000
|
||||
|
||||
//
|
||||
// SD/MMC async transfer timer interval, set by experience.
|
||||
|
@ -14,12 +14,12 @@
|
||||
##
|
||||
|
||||
[Defines]
|
||||
INF_VERSION = 0x00010005
|
||||
INF_VERSION = 0x00010007
|
||||
BASE_NAME = SdMmcPciHcDxe
|
||||
MODULE_UNI_FILE = SdMmcPciHcDxe.uni
|
||||
FILE_GUID = 8E325979-3FE1-4927-AAE2-8F5C4BD2AF0D
|
||||
MODULE_TYPE = UEFI_DRIVER
|
||||
VERSION_STRING = 1.0
|
||||
VERSION_STRING = 1.5.4
|
||||
ENTRY_POINT = InitializeSdMmcPciHcDxe
|
||||
|
||||
#
|
||||
@ -63,6 +63,9 @@
|
||||
gEfiPciIoProtocolGuid ## TO_START
|
||||
gEfiSdMmcPassThruProtocolGuid ## BY_START
|
||||
|
||||
[Guids]
|
||||
gEfiGenericVariableGuid
|
||||
|
||||
# [Event]
|
||||
# EVENT_TYPE_PERIODIC_TIMER ## SOMETIMES_CONSUMES
|
||||
|
||||
|
@ -14,6 +14,9 @@
|
||||
|
||||
#include "SdMmcPciHcDxe.h"
|
||||
|
||||
int g_deviceId = 0;
|
||||
|
||||
|
||||
/**
|
||||
Dump the content of SD/MMC host controller's Capability Register.
|
||||
|
||||
@ -1145,6 +1148,15 @@ SdMmcHcInitPowerVoltage (
|
||||
// Set SD Bus Voltage Select and SD Bus Power fields in Power Control Register
|
||||
//
|
||||
Status = SdMmcHcPowerControl (PciIo, Slot, MaxVoltage);
|
||||
if (BhtHostPciSupport(PciIo)){
|
||||
// 1.8V signaling enable
|
||||
HostCtrl2 = BIT3;
|
||||
Status = SdMmcHcOrMmio (PciIo, Slot, SD_MMC_HC_HOST_CTRL2, sizeof (HostCtrl2), &HostCtrl2);
|
||||
gBS->Stall (5000);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
}
|
||||
|
||||
return Status;
|
||||
}
|
||||
@ -1196,6 +1208,7 @@ SdMmcHcInitHost (
|
||||
EFI_STATUS Status;
|
||||
EFI_PCI_IO_PROTOCOL *PciIo;
|
||||
SD_MMC_HC_SLOT_CAP Capability;
|
||||
UINT32 value32;
|
||||
|
||||
//
|
||||
// Notify the SD/MMC override protocol that we are about to initialize
|
||||
@ -1218,9 +1231,191 @@ SdMmcHcInitHost (
|
||||
PciIo = Private->PciIo;
|
||||
Capability = Private->Capability[Slot];
|
||||
|
||||
Status = SdMmcHcInitV4Enhancements (PciIo, Slot, Capability, Private->ControllerVersion[Slot]);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
if (BhtHostPciSupport(PciIo)){
|
||||
UINT8 CardMode;
|
||||
UINT16 EmmcVar;
|
||||
UINTN EmmcVarSize;
|
||||
UINT64 Cap;
|
||||
|
||||
//unlock PCR write protect
|
||||
#ifdef DISABLE_L1_2
|
||||
PciBhtAnd32(PciIo, 0xd0, ~(BIT31));
|
||||
PciBhtAnd32(PciIo, 0x90, ~(BIT1 | BIT0));
|
||||
|
||||
value32 = PciBhtRead32(PciIo, 0xe0);
|
||||
value32 &= ~(BIT31 | BIT30 | BIT29 | BIT28);
|
||||
value32 |= (BIT29 | BIT28);
|
||||
PciBhtWrite32(PciIo, 0xe0, value32);
|
||||
|
||||
value32 = PciBhtRead32(PciIo, 0xfc);
|
||||
value32 &= ~(BIT19 | BIT18 | BIT17 | BIT16);
|
||||
value32 |= (BIT19);
|
||||
PciBhtWrite32(PciIo, 0xfc, value32);
|
||||
|
||||
value32 = PciBhtRead32(PciIo, 0x3f4);
|
||||
value32 &= ~(BIT3 | BIT2 | BIT1 | BIT0);
|
||||
value32 |= (BIT3 | BIT1);
|
||||
PciBhtWrite32(PciIo, 0x3f4, value32);
|
||||
|
||||
value32 = PciBhtRead32(PciIo, 0x248);
|
||||
value32 &= ~(BIT3 | BIT2 | BIT1 | BIT0);
|
||||
value32 |= (BIT3 | BIT1);
|
||||
PciBhtWrite32(PciIo, 0x248, value32);
|
||||
|
||||
value32 = PciBhtRead32(PciIo, 0x90);
|
||||
value32 &= ~(BIT1 | BIT0);
|
||||
value32 |= (BIT1);
|
||||
PciBhtWrite32(PciIo, 0x90, value32);
|
||||
#endif
|
||||
|
||||
/* FET on */
|
||||
PciBhtOr32(PciIo, 0xEC, 0x3);
|
||||
/* Led on */
|
||||
//PciBhtAnd32(PciIo, 0x334, (UINT32)~BIT13);
|
||||
PciBhtOr32(PciIo, 0xD4, BIT6);
|
||||
/* Set 1.8v emmc signaling flag */
|
||||
PciBhtOr32(PciIo, 0x308, BIT4);
|
||||
/* Set 200MBaseClock */
|
||||
value32 = PciBhtRead32(PciIo, 0x304);
|
||||
value32 &= 0x0000FFFF;
|
||||
value32 |= 0x25100000;
|
||||
#if !defined(HOST_CLK_DRIVE_STRENGTH) || HOST_CLK_DRIVE_STRENGTH > 7 || HOST_CLK_DRIVE_STRENGTH < 0
|
||||
#error "HOST_CMD_DRIVE_STRENGTH is undefined or value is invalid"
|
||||
#else
|
||||
EmmcVarSize = sizeof(EmmcVar);
|
||||
Status = gRT->GetVariable (
|
||||
L"EMMC_CLK_DRIVER_STRENGTH",
|
||||
&gEfiGenericVariableGuid,
|
||||
NULL,
|
||||
&EmmcVarSize,
|
||||
&EmmcVar
|
||||
);
|
||||
if (EFI_ERROR(Status)) {
|
||||
EmmcVar = HOST_CLK_DRIVE_STRENGTH;
|
||||
}
|
||||
value32 &= 0xFFFFFF8F;
|
||||
value32 |= ((EmmcVar & 0x7) << 4);
|
||||
#endif
|
||||
#if !defined(HOST_DAT_DRIVE_STRENGTH) || HOST_DAT_DRIVE_STRENGTH > 7 || HOST_DAT_DRIVE_STRENGTH < 0
|
||||
#error "HOST_DATA_DRIVE_STRENGTH is undefined or value is invalid"
|
||||
#else
|
||||
EmmcVarSize = sizeof(EmmcVar);
|
||||
Status = gRT->GetVariable (
|
||||
L"EMMC_DATA_DRIVER_STRENGTH",
|
||||
&gEfiGenericVariableGuid,
|
||||
NULL,
|
||||
&EmmcVarSize,
|
||||
&EmmcVar
|
||||
);
|
||||
if (EFI_ERROR(Status)) {
|
||||
EmmcVar = HOST_DAT_DRIVE_STRENGTH;
|
||||
}
|
||||
value32 &= 0xFFFFFFF1;
|
||||
value32 |= ((EmmcVar & 0x7) << 1);
|
||||
#endif
|
||||
PciBhtWrite32(PciIo, 0x304, value32);
|
||||
PciBhtOr32(PciIo, 0x3E4, BIT22);
|
||||
|
||||
EmmcVarSize = sizeof(CardMode);
|
||||
Status = gRT->GetVariable (
|
||||
L"EMMC_FORCE_CARD_MODE",
|
||||
&gEfiGenericVariableGuid,
|
||||
NULL,
|
||||
&EmmcVarSize,
|
||||
&CardMode
|
||||
);
|
||||
if (EFI_ERROR(Status) || CardMode > 2) {
|
||||
CardMode = 0;
|
||||
}
|
||||
|
||||
if (CardMode == 1) {
|
||||
#if !defined(HS100_ALLPASS_PHASE) || HS100_ALLPASS_PHASE > 10 || HS100_ALLPASS_PHASE < 0
|
||||
#error "HS200_ALLPASS_PHASE is undefined or value is invalid"
|
||||
#else
|
||||
EmmcVarSize = sizeof(EmmcVar);
|
||||
Status = gRT->GetVariable (
|
||||
L"EMMC_HS100_ALLPASS_PHASE",
|
||||
&gEfiGenericVariableGuid,
|
||||
NULL,
|
||||
&EmmcVarSize,
|
||||
&EmmcVar
|
||||
);
|
||||
if (EFI_ERROR(Status) || EmmcVar > 10) {
|
||||
EmmcVar = HS100_ALLPASS_PHASE;
|
||||
}
|
||||
#endif
|
||||
} else if (CardMode == 2) {
|
||||
#if !defined(HS200_ALLPASS_PHASE) || HS200_ALLPASS_PHASE > 10 || HS200_ALLPASS_PHASE < 0
|
||||
#error "HS200_ALLPASS_PHASE is undefined or value is invalid"
|
||||
#else
|
||||
EmmcVarSize = sizeof(EmmcVar);
|
||||
Status = gRT->GetVariable (
|
||||
L"EMMC_HS200_ALLPASS_PHASE",
|
||||
&gEfiGenericVariableGuid,
|
||||
NULL,
|
||||
&EmmcVarSize,
|
||||
&EmmcVar
|
||||
);
|
||||
if (EFI_ERROR(Status) || EmmcVar > 10) {
|
||||
EmmcVar = HS200_ALLPASS_PHASE;
|
||||
}
|
||||
#endif
|
||||
}
|
||||
|
||||
value32 = 0x21000033 | (EmmcVar << 20);
|
||||
PciBhtWrite32(PciIo, 0x300, value32);
|
||||
|
||||
//enable internal clk
|
||||
value32 = BIT0;
|
||||
Status = SdMmcHcOrMmio (PciIo, Slot, SD_MMC_HC_CLOCK_CTRL,sizeof(value32), &value32);
|
||||
|
||||
//reset pll start
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, 0x1CC, TRUE, sizeof(value32), &value32);
|
||||
value32 |= BIT12;
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, 0x1CC, FALSE, sizeof(value32), &value32);
|
||||
gBS->Stall(1);
|
||||
|
||||
//reset pll end
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, 0x1CC, TRUE,sizeof(value32), &value32);
|
||||
value32 &= ~BIT12;
|
||||
value32 |= BIT18;
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, 0x1CC, FALSE, sizeof(value32), &value32);
|
||||
|
||||
//wait BaseClk stable 0x1CC bit14
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, 0x1CC, TRUE, sizeof(value32), &value32);
|
||||
while(!(value32&BIT14)){
|
||||
gBS->Stall(100);
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, 0x1CC, TRUE, sizeof(value32), &value32);
|
||||
}
|
||||
|
||||
if (value32 & BIT18) {
|
||||
//Wait 2nd Card Detect debounce Finished by wait twice of debounce max time
|
||||
while (1) {
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, SD_MMC_HC_PRESENT_STATE, TRUE, sizeof(value32), &value32);
|
||||
if (((value32 >> 16) & 0x01) == ((value32 >> 18) & 0x01))
|
||||
break;
|
||||
}
|
||||
//force pll active end
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, 0x1CC, TRUE, sizeof(value32), &value32);
|
||||
value32 &= ~BIT18;
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, 0x1CC, FALSE, sizeof(value32), &value32);
|
||||
}
|
||||
|
||||
Status = SdMmcHcRwMmio (PciIo, Slot, SD_MMC_HC_CAP, TRUE, sizeof (Cap), &Cap);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
CopyMem (&Capability, &Cap, sizeof (Cap));
|
||||
|
||||
Status = SdMmcHcInitPowerVoltage (PciIo, Slot, Capability);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
} else {
|
||||
Status = SdMmcHcInitV4Enhancements (PciIo, Slot, Capability, Private->ControllerVersion[Slot]);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
}
|
||||
|
||||
//
|
||||
@ -1235,9 +1430,11 @@ SdMmcHcInitHost (
|
||||
return Status;
|
||||
}
|
||||
|
||||
Status = SdMmcHcInitPowerVoltage (PciIo, Slot, Capability);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
if (!BhtHostPciSupport(PciIo)){
|
||||
Status = SdMmcHcInitPowerVoltage (PciIo, Slot, Capability);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
}
|
||||
|
||||
Status = SdMmcHcInitTimeoutCtrl (PciIo, Slot);
|
||||
@ -2836,3 +3033,279 @@ SdMmcWaitTrbResult (
|
||||
return EFI_TIMEOUT;
|
||||
}
|
||||
|
||||
BOOLEAN BhtHostPciSupport(EFI_PCI_IO_PROTOCOL *PciIo)
|
||||
{
|
||||
PCI_TYPE00 Pci;
|
||||
|
||||
PciIo->Pci.Read (PciIo, EfiPciIoWidthUint32,
|
||||
0, sizeof Pci / sizeof (UINT32), &Pci);
|
||||
|
||||
DEBUG ((DEBUG_INFO, "check device %04x:%04x\n", Pci.Hdr.VendorId, Pci.Hdr.DeviceId));
|
||||
|
||||
if (Pci.Hdr.VendorId != 0x1217)
|
||||
goto end;
|
||||
|
||||
switch (Pci.Hdr.DeviceId)
|
||||
{
|
||||
case 0x8420: //PCI_DEV_ID_SDS0
|
||||
case 0x8421: //PCI_DEV_ID_SDS1
|
||||
case 0x8520: //PCI_DEV_ID_FJ2
|
||||
case 0x8620: //PCI_DEV_ID_SB0
|
||||
case 0x8621: //PCI_DEV_ID_SB1
|
||||
g_deviceId = Pci.Hdr.DeviceId;
|
||||
return 1;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
|
||||
end:
|
||||
return 0;
|
||||
}
|
||||
|
||||
void DbgNull(IN CONST CHAR16 * fmt, ...)
|
||||
{
|
||||
}
|
||||
|
||||
UINT32 bht_readl(EFI_PCI_IO_PROTOCOL *PciIo, UINT32 offset)
|
||||
{
|
||||
UINT32 arg;
|
||||
PciIo->Mem.Read(PciIo,EfiPciIoWidthUint32,1,offset,1,&arg);
|
||||
return arg;
|
||||
}
|
||||
|
||||
void bht_writel(EFI_PCI_IO_PROTOCOL *PciIo, UINT32 offset, UINT32 value)
|
||||
{
|
||||
PciIo->Mem.Write(PciIo,EfiPciIoWidthUint32,1,offset,1,&value);
|
||||
}
|
||||
|
||||
|
||||
UINT32 PciBhtRead32(EFI_PCI_IO_PROTOCOL *PciIo, UINT32 offset)
|
||||
{
|
||||
UINT32 i = 0;
|
||||
UINT32 tmp[3] = {0};
|
||||
|
||||
if((g_deviceId == PCI_DEV_ID_SDS0) ||
|
||||
(g_deviceId == PCI_DEV_ID_SDS1) ||
|
||||
(g_deviceId == PCI_DEV_ID_FJ2) ||
|
||||
(g_deviceId == PCI_DEV_ID_SB0) ||
|
||||
(g_deviceId == PCI_DEV_ID_SB1))
|
||||
{
|
||||
// For Sandstorm, HW implement a mapping method by memory space reg to access PCI reg.
|
||||
// Enable mapping
|
||||
|
||||
// Check function conflict
|
||||
if((g_deviceId == PCI_DEV_ID_SDS0) ||
|
||||
(g_deviceId == PCI_DEV_ID_FJ2) ||
|
||||
(g_deviceId == PCI_DEV_ID_SB0) ||
|
||||
(g_deviceId == PCI_DEV_ID_SB1))
|
||||
{
|
||||
i = 0;
|
||||
bht_writel(PciIo, BHT_PCIRMappingEn, 0x40000000);
|
||||
while((bht_readl(PciIo, BHT_PCIRMappingEn) & 0x40000000) == 0)
|
||||
{
|
||||
if(i == 5)
|
||||
{
|
||||
goto RD_DIS_MAPPING;
|
||||
}
|
||||
gBS->Stall(1000);
|
||||
i++;
|
||||
bht_writel(PciIo, BHT_PCIRMappingEn, 0x40000000);
|
||||
|
||||
}
|
||||
}
|
||||
else if(g_deviceId == PCI_DEV_ID_SDS1)
|
||||
{
|
||||
i = 0;
|
||||
bht_writel(PciIo, BHT_PCIRMappingEn, 0x20000000);
|
||||
while((bht_readl(PciIo, BHT_PCIRMappingEn) & 0x20000000) == 0)
|
||||
{
|
||||
if(i == 5)
|
||||
{
|
||||
//DbgErr((DRIVERNAME " - %s() function 1 can't lock!\n", __FUNCTION__));
|
||||
goto RD_DIS_MAPPING;
|
||||
}
|
||||
gBS->Stall(1000);
|
||||
i++;
|
||||
bht_writel(PciIo, BHT_PCIRMappingEn, 0x20000000);
|
||||
}
|
||||
}
|
||||
|
||||
// Check last operation is complete
|
||||
i = 0;
|
||||
while(bht_readl(PciIo, BHT_PCIRMappingCtl) & 0xc0000000)
|
||||
{
|
||||
if(i == 5)
|
||||
{
|
||||
//DbgErr((DRIVERNAME " - [204] = 0x%x\n", RegisterRead32(ELN_dPCIRMappingCtl)));
|
||||
//DbgErr((DRIVERNAME " - [208] = 0x%x\n", RegisterRead32(ELN_dPCIRMappingEn)));
|
||||
//DbgErr((DRIVERNAME " - %s() check last operation complete timeout!!!\n", __FUNCTION__));
|
||||
goto RD_DIS_MAPPING;
|
||||
}
|
||||
gBS->Stall(1000);
|
||||
i += 1;
|
||||
}
|
||||
|
||||
// Set register address
|
||||
tmp[0] |= 0x40000000;
|
||||
tmp[0] |= offset;
|
||||
bht_writel(PciIo, BHT_PCIRMappingCtl, tmp[0]);
|
||||
|
||||
// Check read is complete
|
||||
i = 0;
|
||||
while(bht_readl(PciIo, BHT_PCIRMappingCtl) & 0x40000000)
|
||||
{
|
||||
if(i == 5)
|
||||
{
|
||||
//DbgErr((DRIVERNAME " - %s() check read operation complete timeout!!!\n", __FUNCTION__));
|
||||
goto RD_DIS_MAPPING;
|
||||
}
|
||||
gBS->Stall(1000);
|
||||
i += 1;
|
||||
}
|
||||
|
||||
// Get PCIR value
|
||||
tmp[1] = bht_readl(PciIo, BHT_PCIRMappingVal);
|
||||
|
||||
RD_DIS_MAPPING:
|
||||
// Disable mapping
|
||||
bht_writel(PciIo, BHT_PCIRMappingEn, 0x80000000);
|
||||
|
||||
//DbgDebug(L"%s offset=%x Value:%x\n", __FUNCTION__, offset, tmp[1]);
|
||||
return tmp[1];
|
||||
}
|
||||
|
||||
//DbgDebug(L"%s offset=%x Value:%x\n", __FUNCTION__, offset, tmp[0]);
|
||||
return tmp[0];
|
||||
}
|
||||
|
||||
void PciBhtWrite32(EFI_PCI_IO_PROTOCOL *PciIo, UINT32 offset, UINT32 value)
|
||||
{
|
||||
UINT32 tmp = 0;
|
||||
UINT32 i = 0;
|
||||
|
||||
if((g_deviceId == PCI_DEV_ID_SDS0) ||
|
||||
(g_deviceId == PCI_DEV_ID_SDS1) ||
|
||||
(g_deviceId == PCI_DEV_ID_FJ2) ||
|
||||
(g_deviceId == PCI_DEV_ID_SB0) ||
|
||||
(g_deviceId == PCI_DEV_ID_SB1))
|
||||
{
|
||||
// For Sandstorm, HW implement a mapping method by memory space reg to access PCI reg.
|
||||
// Upper caller doesn't need to set 0xD0.
|
||||
|
||||
// Enable mapping
|
||||
|
||||
// Check function conflict
|
||||
if((g_deviceId == PCI_DEV_ID_SDS0) ||
|
||||
(g_deviceId == PCI_DEV_ID_FJ2) ||
|
||||
(g_deviceId == PCI_DEV_ID_SB0) ||
|
||||
(g_deviceId == PCI_DEV_ID_SB1))
|
||||
{
|
||||
i = 0;
|
||||
bht_writel(PciIo, BHT_PCIRMappingEn, 0x40000000);
|
||||
while((bht_readl(PciIo, BHT_PCIRMappingEn) & 0x40000000) == 0)
|
||||
{
|
||||
if(i == 5)
|
||||
{
|
||||
//DbgErr((DRIVERNAME " - %s() function 0 can't lock!\n", __FUNCTION__));
|
||||
goto WR_DIS_MAPPING;
|
||||
}
|
||||
|
||||
gBS->Stall(1000);
|
||||
i++;
|
||||
bht_writel(PciIo, BHT_PCIRMappingEn, 0x40000000);
|
||||
}
|
||||
}
|
||||
else if(g_deviceId == PCI_DEV_ID_SDS1)
|
||||
{
|
||||
i = 0;
|
||||
bht_writel(PciIo, BHT_PCIRMappingEn, 0x20000000);
|
||||
|
||||
while((bht_readl(PciIo, BHT_PCIRMappingEn) & 0x20000000) == 0)
|
||||
{
|
||||
if(i == 5)
|
||||
{
|
||||
//DbgErr((DRIVERNAME " - %s() function 0 can't lock!\n", __FUNCTION__));
|
||||
goto WR_DIS_MAPPING;
|
||||
}
|
||||
|
||||
gBS->Stall(1000);
|
||||
i++;
|
||||
bht_writel(PciIo, BHT_PCIRMappingEn, 0x20000000);
|
||||
}
|
||||
}
|
||||
|
||||
// Enable MEM access
|
||||
bht_writel(PciIo, BHT_PCIRMappingVal, 0x80000000);
|
||||
bht_writel(PciIo, BHT_PCIRMappingCtl, 0x800000D0);
|
||||
|
||||
// Check last operation is complete
|
||||
i = 0;
|
||||
while(bht_readl(PciIo, BHT_PCIRMappingCtl) & 0xc0000000)
|
||||
{
|
||||
if(i == 5)
|
||||
{
|
||||
//DbgErr((DRIVERNAME " - %s() check last operation complete timeout!!!\n", __FUNCTION__));
|
||||
goto WR_DIS_MAPPING;
|
||||
}
|
||||
gBS->Stall(1000);
|
||||
i += 1;
|
||||
}
|
||||
|
||||
// Set write value
|
||||
bht_writel(PciIo, BHT_PCIRMappingVal, value);
|
||||
// Set register address
|
||||
tmp |= 0x80000000;
|
||||
tmp |= offset;
|
||||
bht_writel(PciIo, BHT_PCIRMappingCtl, tmp);
|
||||
|
||||
// Check write is complete
|
||||
i = 0;
|
||||
while(bht_readl(PciIo, BHT_PCIRMappingCtl) & 0x80000000)
|
||||
{
|
||||
if(i == 5)
|
||||
{
|
||||
//DbgErr((DRIVERNAME " - %s() check write operation complete timeout!!!\n", __FUNCTION__));
|
||||
goto WR_DIS_MAPPING;
|
||||
}
|
||||
gBS->Stall(1000);
|
||||
i += 1;
|
||||
}
|
||||
|
||||
WR_DIS_MAPPING:
|
||||
// Disable MEM access
|
||||
bht_writel(PciIo, BHT_PCIRMappingVal, 0x80000001);
|
||||
bht_writel(PciIo, BHT_PCIRMappingCtl, 0x800000D0);
|
||||
|
||||
// Check last operation is complete
|
||||
i = 0;
|
||||
while(bht_readl(PciIo, BHT_PCIRMappingCtl) & 0xc0000000)
|
||||
{
|
||||
if(i == 5)
|
||||
{
|
||||
//DbgErr((DRIVERNAME " - %s() check last operation complete timeout!!!\n", __FUNCTION__));
|
||||
break;
|
||||
}
|
||||
gBS->Stall(1000);
|
||||
i += 1;
|
||||
}
|
||||
|
||||
// Disable function conflict
|
||||
|
||||
// Disable mapping
|
||||
bht_writel(PciIo, BHT_PCIRMappingEn, 0x80000000);
|
||||
}
|
||||
}
|
||||
|
||||
void PciBhtOr32(EFI_PCI_IO_PROTOCOL *PciIo, UINT32 offset, UINT32 value)
|
||||
{
|
||||
UINT32 arg;
|
||||
arg = PciBhtRead32(PciIo, offset);
|
||||
PciBhtWrite32(PciIo, offset, value | arg);
|
||||
}
|
||||
|
||||
void PciBhtAnd32(EFI_PCI_IO_PROTOCOL *PciIo, UINT32 offset, UINT32 value)
|
||||
{
|
||||
UINT32 arg;
|
||||
arg = PciBhtRead32(PciIo, offset);
|
||||
PciBhtWrite32(PciIo, offset, value & arg);
|
||||
}
|
||||
|
@ -607,4 +607,33 @@ SdMmcSetDriverStrength (
|
||||
IN SD_DRIVER_STRENGTH_TYPE DriverStrength
|
||||
);
|
||||
|
||||
BOOLEAN
|
||||
BhtHostPciSupport(EFI_PCI_IO_PROTOCOL *PciIo);
|
||||
UINT32
|
||||
PciBhtRead32(EFI_PCI_IO_PROTOCOL *PciIo, UINT32 offset);
|
||||
void
|
||||
PciBhtWrite32(EFI_PCI_IO_PROTOCOL *PciIo, UINT32 offset, UINT32 value);
|
||||
void
|
||||
PciBhtOr32(EFI_PCI_IO_PROTOCOL *PciIo, UINT32 offset, UINT32 value);
|
||||
void
|
||||
PciBhtAnd32(EFI_PCI_IO_PROTOCOL *PciIo, UINT32 offset, UINT32 value);
|
||||
extern void
|
||||
DbgNull(IN CONST CHAR16 * fmt, ...);
|
||||
|
||||
|
||||
#define PCI_DEV_ID_RJ 0x8320
|
||||
#define PCI_DEV_ID_SDS0 0x8420
|
||||
#define PCI_DEV_ID_SDS1 0x8421
|
||||
#define PCI_DEV_ID_FJ2 0x8520
|
||||
#define PCI_DEV_ID_SB0 0x8620
|
||||
#define PCI_DEV_ID_SB1 0x8621
|
||||
|
||||
|
||||
// O2/BHT add BAR1 for PCIR mapping registers
|
||||
// These registers is defined by O2/BHT, but we may follow name definition rule.
|
||||
#define BHT_PCIRMappingVal (0x200) /* PCI CFG Space Register Mapping Value Register */
|
||||
#define BHT_PCIRMappingCtl (0x204) /* PCI CFG Space Register Mapping Control Register */
|
||||
#define BHT_PCIRMappingEn (0x208) /* PCI CFG Space Register Mapping Enable Register */
|
||||
#define BHT_GPIOCTL (0x210) /* GPIO control register*/
|
||||
|
||||
#endif
|
||||
|
@ -285,7 +285,7 @@ UsbHcBulkTransfer (
|
||||
IN UINT8 DevSpeed,
|
||||
IN UINTN MaxPacket,
|
||||
IN UINT8 BufferNum,
|
||||
IN OUT VOID *Data[EFI_USB_MAX_BULK_BUFFER_NUM],
|
||||
IN OUT VOID *Data[],
|
||||
IN OUT UINTN *DataLength,
|
||||
IN OUT UINT8 *DataToggle,
|
||||
IN UINTN TimeOut,
|
||||
|
@ -149,7 +149,7 @@ UsbHcBulkTransfer (
|
||||
IN UINT8 DevSpeed,
|
||||
IN UINTN MaxPacket,
|
||||
IN UINT8 BufferNum,
|
||||
IN OUT VOID *Data[EFI_USB_MAX_BULK_BUFFER_NUM],
|
||||
IN OUT VOID *Data[],
|
||||
IN OUT UINTN *DataLength,
|
||||
IN OUT UINT8 *DataToggle,
|
||||
IN UINTN TimeOut,
|
||||
|
@ -801,10 +801,7 @@ InitUSBKeyboard (
|
||||
IN OUT USB_KB_DEV *UsbKeyboardDevice
|
||||
)
|
||||
{
|
||||
UINT16 ConfigValue;
|
||||
UINT8 Protocol;
|
||||
EFI_STATUS Status;
|
||||
UINT32 TransferResult;
|
||||
|
||||
REPORT_STATUS_CODE_WITH_DEVICE_PATH (
|
||||
EFI_PROGRESS_CODE,
|
||||
@ -816,56 +813,28 @@ InitUSBKeyboard (
|
||||
InitQueue (&UsbKeyboardDevice->EfiKeyQueue, sizeof (EFI_KEY_DATA));
|
||||
InitQueue (&UsbKeyboardDevice->EfiKeyQueueForNotify, sizeof (EFI_KEY_DATA));
|
||||
|
||||
//
|
||||
// Use the config out of the descriptor
|
||||
// Assumed the first config is the correct one and this is not always the case
|
||||
//
|
||||
Status = UsbGetConfiguration (
|
||||
UsbKeyboardDevice->UsbIo,
|
||||
&ConfigValue,
|
||||
&TransferResult
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
ConfigValue = 0x01;
|
||||
//
|
||||
// Uses default configuration to configure the USB Keyboard device.
|
||||
//
|
||||
Status = UsbSetConfiguration (
|
||||
UsbKeyboardDevice->UsbIo,
|
||||
ConfigValue,
|
||||
&TransferResult
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
//
|
||||
// If configuration could not be set here, it means
|
||||
// the keyboard interface has some errors and could
|
||||
// not be initialized
|
||||
//
|
||||
REPORT_STATUS_CODE_WITH_DEVICE_PATH (
|
||||
EFI_ERROR_CODE | EFI_ERROR_MINOR,
|
||||
(EFI_PERIPHERAL_KEYBOARD | EFI_P_EC_INTERFACE_ERROR),
|
||||
UsbKeyboardDevice->DevicePath
|
||||
);
|
||||
|
||||
return EFI_DEVICE_ERROR;
|
||||
}
|
||||
}
|
||||
|
||||
UsbGetProtocolRequest (
|
||||
UsbKeyboardDevice->UsbIo,
|
||||
UsbKeyboardDevice->InterfaceDescriptor.InterfaceNumber,
|
||||
&Protocol
|
||||
);
|
||||
//
|
||||
// Set boot protocol for the USB Keyboard.
|
||||
// This driver only supports boot protocol.
|
||||
//
|
||||
if (Protocol != BOOT_PROTOCOL) {
|
||||
UsbSetProtocolRequest (
|
||||
UsbKeyboardDevice->UsbIo,
|
||||
UsbKeyboardDevice->InterfaceDescriptor.InterfaceNumber,
|
||||
BOOT_PROTOCOL
|
||||
Status = UsbSetProtocolRequest (
|
||||
UsbKeyboardDevice->UsbIo,
|
||||
UsbKeyboardDevice->InterfaceDescriptor.InterfaceNumber,
|
||||
BOOT_PROTOCOL
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
//
|
||||
// If protocol could not be set here, it means
|
||||
// the keyboard interface has some errors and could
|
||||
// not be initialized
|
||||
//
|
||||
REPORT_STATUS_CODE_WITH_DEVICE_PATH (
|
||||
EFI_ERROR_CODE | EFI_ERROR_MINOR,
|
||||
(EFI_PERIPHERAL_KEYBOARD | EFI_P_EC_INTERFACE_ERROR),
|
||||
UsbKeyboardDevice->DevicePath
|
||||
);
|
||||
|
||||
return EFI_DEVICE_ERROR;
|
||||
}
|
||||
|
||||
UsbKeyboardDevice->CtrlOn = FALSE;
|
||||
|
@ -70,6 +70,10 @@ CoreRemoveInterfaceFromProtocol (
|
||||
for(Link = ProtEntry->Notify.ForwardLink; Link != &ProtEntry->Notify; Link=Link->ForwardLink) {
|
||||
ProtNotify = CR(Link, PROTOCOL_NOTIFY, Link, PROTOCOL_NOTIFY_SIGNATURE);
|
||||
|
||||
// Signal notify events before removing the protocol too.
|
||||
// XXX: What effect does this have on other code?
|
||||
CoreSignalEvent (ProtNotify->Event);
|
||||
|
||||
if (ProtNotify->Position == &Prot->ByProtocol) {
|
||||
ProtNotify->Position = Prot->ByProtocol.BackLink;
|
||||
}
|
||||
|
@ -61,4 +61,14 @@ BootLogoUpdateProgress (
|
||||
IN UINTN PreviousValue
|
||||
);
|
||||
|
||||
/**
|
||||
|
||||
Install Boot Logo into BGRT table
|
||||
|
||||
**/
|
||||
VOID
|
||||
AddBGRT (
|
||||
VOID
|
||||
);
|
||||
|
||||
#endif
|
||||
|
@ -213,7 +213,7 @@ TranslateBmpToGopBlt (
|
||||
|
||||
if ((BmpHeader->Size != BmpImageSize) ||
|
||||
(BmpHeader->Size < BmpHeader->ImageOffset) ||
|
||||
(BmpHeader->Size - BmpHeader->ImageOffset != DataSize)) {
|
||||
(BmpHeader->Size - BmpHeader->ImageOffset < DataSize)) {
|
||||
|
||||
DEBUG ((DEBUG_ERROR, "TranslateBmpToGopBlt: invalid BmpImage... \n"));
|
||||
DEBUG ((DEBUG_ERROR, " BmpHeader->Size: 0x%x\n", BmpHeader->Size));
|
||||
|
283
MdeModulePkg/Library/BootLogoLib/Bgrt.c
Normal file
283
MdeModulePkg/Library/BootLogoLib/Bgrt.c
Normal file
@ -0,0 +1,283 @@
|
||||
#include <IndustryStandard/Acpi.h>
|
||||
#include <IndustryStandard/Bmp.h>
|
||||
#include <Library/BaseLib.h>
|
||||
#include <Library/BaseMemoryLib.h>
|
||||
#include <Library/BootLogoLib.h>
|
||||
#include <Library/DebugLib.h>
|
||||
#include <Library/UefiBootServicesTableLib.h>
|
||||
#include <Protocol/FirmwareVolume2.h>
|
||||
#include <Protocol/SimpleFileSystem.h>
|
||||
|
||||
/** RSDP (Root System Description Pointer) */
|
||||
typedef struct {
|
||||
CHAR8 signature[8];
|
||||
UINT8 checksum;
|
||||
CHAR8 oem_id[6];
|
||||
UINT8 revision;
|
||||
UINT32 rsdt_address;
|
||||
UINT32 length;
|
||||
UINT64 xsdt_address;
|
||||
UINT8 extended_checksum;
|
||||
UINT8 reserved[3];
|
||||
} ACPI_20_RSDP;
|
||||
|
||||
/** SDT (System Description Table) entry header */
|
||||
typedef struct {
|
||||
CHAR8 signature[4];
|
||||
UINT32 length;
|
||||
UINT8 revision;
|
||||
UINT8 checksum;
|
||||
CHAR8 oem_id[6];
|
||||
CHAR8 oem_table_id[8];
|
||||
UINT32 oem_revision;
|
||||
UINT32 asl_compiler_id;
|
||||
UINT32 asl_compiler_revision;
|
||||
} ACPI_SDT_HEADER;
|
||||
|
||||
/** BGRT structure */
|
||||
typedef struct {
|
||||
ACPI_SDT_HEADER header;
|
||||
UINT16 version;
|
||||
UINT8 status;
|
||||
UINT8 image_type;
|
||||
UINT64 image_address;
|
||||
UINT32 image_offset_x;
|
||||
UINT32 image_offset_y;
|
||||
} ACPI_BGRT;
|
||||
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
LoadBmp(
|
||||
OUT EFI_PHYSICAL_ADDRESS *BmpAddress,
|
||||
OUT UINT32 *BmpSize
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
UINTN FvProtocolCount;
|
||||
EFI_HANDLE *FvHandles;
|
||||
EFI_FIRMWARE_VOLUME2_PROTOCOL *Fv;
|
||||
UINTN Index;
|
||||
UINT32 AuthenticationStatus;
|
||||
|
||||
UINT8 *Buffer;
|
||||
UINTN BmpBufferSize;
|
||||
|
||||
Buffer = 0;
|
||||
FvHandles = NULL;
|
||||
|
||||
Status = gBS->LocateHandleBuffer (
|
||||
ByProtocol,
|
||||
&gEfiFirmwareVolume2ProtocolGuid,
|
||||
NULL,
|
||||
&FvProtocolCount,
|
||||
&FvHandles
|
||||
);
|
||||
|
||||
if (!EFI_ERROR (Status)) {
|
||||
for (Index = 0; Index < FvProtocolCount; Index++) {
|
||||
Status = gBS->HandleProtocol (
|
||||
FvHandles[Index],
|
||||
&gEfiFirmwareVolume2ProtocolGuid,
|
||||
(VOID **) &Fv
|
||||
);
|
||||
BmpBufferSize = 0;
|
||||
Status = Fv->ReadSection (
|
||||
Fv,
|
||||
(EFI_GUID *)PcdGetPtr(PcdLogoFile),
|
||||
EFI_SECTION_RAW,
|
||||
0,
|
||||
(void **)&Buffer,
|
||||
&BmpBufferSize,
|
||||
&AuthenticationStatus
|
||||
);
|
||||
|
||||
if (!EFI_ERROR (Status)) {
|
||||
*BmpAddress = (EFI_PHYSICAL_ADDRESS)(UINTN)Buffer;
|
||||
*BmpSize = (UINT32)BmpBufferSize;
|
||||
Status = EFI_SUCCESS;
|
||||
break;
|
||||
}
|
||||
}
|
||||
} else {
|
||||
Status = EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
if (FvHandles != NULL) {
|
||||
gBS->FreePool (FvHandles);
|
||||
FvHandles = NULL;
|
||||
}
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
UINT8 SumBytes(const UINT8* arr, UINTN size) {
|
||||
UINT8 sum = 0;
|
||||
UINTN i;
|
||||
for (i = 0; i < size; ++i) {
|
||||
sum += arr[i];
|
||||
}
|
||||
return sum;
|
||||
}
|
||||
|
||||
int VerifyAcpiRsdp2Checksums(const void* data) {
|
||||
const UINT8* arr = data;
|
||||
UINTN size = *(const UINT32*)&arr[20];
|
||||
return SumBytes(arr, 20) == 0 && SumBytes(arr, size) == 0;
|
||||
}
|
||||
|
||||
void SetAcpiRsdp2Checksums(void* data) {
|
||||
UINT8* arr = data;
|
||||
UINTN size = *(const UINT32*)&arr[20];
|
||||
arr[9] = 0;
|
||||
arr[32] = 0;
|
||||
arr[9] = -SumBytes(arr, 20);
|
||||
arr[32] = -SumBytes(arr, size);
|
||||
}
|
||||
|
||||
int VerifyAcpiSdtChecksum(const void* data) {
|
||||
const UINT8* arr = data;
|
||||
UINTN size = *(const UINT32*)&arr[4];
|
||||
return SumBytes(arr, size) == 0;
|
||||
}
|
||||
|
||||
void SetAcpiSdtChecksum(void* data) {
|
||||
UINT8* arr = data;
|
||||
UINTN size = *(const UINT32*)&arr[4];
|
||||
arr[9] = 0;
|
||||
arr[9] = -SumBytes(arr, size);
|
||||
}
|
||||
|
||||
const CHAR16* TmpStr(CHAR8 *src, int length) {
|
||||
static CHAR16 arr[4][16];
|
||||
static int j;
|
||||
CHAR16* dest = arr[j = (j+1) % 4];
|
||||
int i;
|
||||
for (i = 0; i < length && i < 16-1 && src[i]; ++i) {
|
||||
dest[i] = src[i];
|
||||
}
|
||||
dest[i] = 0;
|
||||
return dest;
|
||||
}
|
||||
|
||||
static UINT32 min(UINT32 first, UINT32 second){
|
||||
if (first < second)
|
||||
return first;
|
||||
return second;
|
||||
}
|
||||
|
||||
ACPI_SDT_HEADER* CreateXsdt(ACPI_SDT_HEADER* xsdt0, UINTN entries) {
|
||||
ACPI_SDT_HEADER* xsdt = 0;
|
||||
UINT32 xsdt_len = (UINT32)(sizeof(ACPI_SDT_HEADER) + entries * sizeof(UINT64));
|
||||
gBS->AllocatePool(EfiACPIReclaimMemory, xsdt_len, (void**)&xsdt);
|
||||
if (!xsdt) {
|
||||
DEBUG ((EFI_D_INFO, "HackBGRT: Failed to allocate memory for XSDT.\n"));
|
||||
return 0;
|
||||
}
|
||||
ZeroMem(xsdt, xsdt_len);
|
||||
CopyMem(xsdt, xsdt0, min(xsdt0->length, xsdt_len));
|
||||
xsdt->length = xsdt_len;
|
||||
SetAcpiSdtChecksum(xsdt);
|
||||
return xsdt;
|
||||
}
|
||||
|
||||
static ACPI_BGRT* HandleAcpiTables(ACPI_BGRT* bgrt) {
|
||||
int i;
|
||||
|
||||
for (i = 0; i < gST->NumberOfTableEntries; i++) {
|
||||
EFI_GUID* vendor_guid = &gST->ConfigurationTable[i].VendorGuid;
|
||||
ACPI_20_RSDP *rsdp;
|
||||
ACPI_SDT_HEADER *xsdt;
|
||||
UINT64 *entry_arr;
|
||||
UINT32 entry_arr_length;
|
||||
|
||||
if (!CompareGuid(vendor_guid, &gEfiAcpiTableGuid) && !CompareGuid(vendor_guid, &gEfiAcpi20TableGuid)) {
|
||||
continue;
|
||||
}
|
||||
rsdp = (ACPI_20_RSDP *) gST->ConfigurationTable[i].VendorTable;
|
||||
if (CompareMem(rsdp->signature, "RSD PTR ", 8) != 0 || rsdp->revision < 2 || !VerifyAcpiRsdp2Checksums(rsdp)) {
|
||||
continue;
|
||||
}
|
||||
DEBUG ((EFI_D_INFO, "RSDP: revision = %d, OEM ID = %s\n", rsdp->revision, TmpStr(rsdp->oem_id, 6)));
|
||||
|
||||
xsdt = (ACPI_SDT_HEADER *) (UINTN) rsdp->xsdt_address;
|
||||
if (!xsdt || CompareMem(xsdt->signature, "XSDT", 4) != 0 || !VerifyAcpiSdtChecksum(xsdt)) {
|
||||
DEBUG ((EFI_D_INFO, "* XSDT: missing or invalid\n"));
|
||||
continue;
|
||||
}
|
||||
entry_arr = (UINT64*)&xsdt[1];
|
||||
entry_arr_length = (xsdt->length - sizeof(*xsdt)) / sizeof(UINT64);
|
||||
|
||||
DEBUG ((EFI_D_INFO, "* XSDT: OEM ID = %s, entry count = %d\n", TmpStr(xsdt->oem_id, 6), entry_arr_length));
|
||||
|
||||
if (bgrt) {
|
||||
DEBUG ((EFI_D_INFO, " - Adding missing BGRT.\n"));
|
||||
xsdt = CreateXsdt(xsdt, entry_arr_length + 1);
|
||||
entry_arr = (UINT64*)&xsdt[1];
|
||||
entry_arr[entry_arr_length++] = (UINTN) bgrt;
|
||||
rsdp->xsdt_address = (UINTN) xsdt;
|
||||
SetAcpiRsdp2Checksums(rsdp);
|
||||
}
|
||||
SetAcpiSdtChecksum(xsdt);
|
||||
}
|
||||
return bgrt;
|
||||
}
|
||||
|
||||
VOID
|
||||
AddBGRT (
|
||||
VOID
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
ACPI_BGRT *bgrt;
|
||||
EFI_GRAPHICS_OUTPUT_PROTOCOL *GraphicsOutput;
|
||||
EFI_PHYSICAL_ADDRESS BmpAddress;
|
||||
UINT32 BmpSize;
|
||||
BMP_IMAGE_HEADER *BmpHeader;
|
||||
const char data[0x38] =
|
||||
"BGRT" "\x38\x00\x00\x00" "\x00" "\xd6" "INTEL " " EDK2"
|
||||
"\x20\x17\x00\x00" "PTL " "\x02\x00\x00\x00"
|
||||
"\x01\x00" "\x00" "\x00";
|
||||
|
||||
BmpAddress = 0;
|
||||
|
||||
DEBUG ((EFI_D_INFO, "HackBGRT Start\n"));
|
||||
|
||||
Status = gBS->HandleProtocol (
|
||||
gST->ConsoleOutHandle,
|
||||
&gEfiGraphicsOutputProtocolGuid,
|
||||
(VOID**)&GraphicsOutput
|
||||
);
|
||||
|
||||
// Replace missing = allocate new.
|
||||
gBS->AllocatePool(EfiACPIReclaimMemory, sizeof(*bgrt), (void**)&bgrt);
|
||||
if (!bgrt) {
|
||||
DEBUG ((EFI_D_INFO, "HackBGRT MEM ERR\n"));
|
||||
return;
|
||||
}
|
||||
|
||||
DEBUG ((EFI_D_INFO, "HackBGRT Load Bmp\n"));
|
||||
Status = LoadBmp(&BmpAddress, &BmpSize);
|
||||
if (EFI_ERROR(Status)){
|
||||
DEBUG ((EFI_D_INFO, "HackBGRT BMP Load ERR\n"));
|
||||
return;
|
||||
}
|
||||
|
||||
DEBUG ((EFI_D_INFO, "HackBGRT Set Table; BMP Size: %d\n", BmpSize));
|
||||
// Clear the BGRT.
|
||||
CopyMem(bgrt, data, sizeof(data));
|
||||
|
||||
if (GraphicsOutput != NULL && GraphicsOutput->Mode != NULL && GraphicsOutput->Mode->Info != NULL)
|
||||
{
|
||||
BmpHeader = (BMP_IMAGE_HEADER *)BmpAddress;
|
||||
bgrt->image_address = (UINTN)BmpAddress;
|
||||
bgrt->image_offset_x = (GraphicsOutput->Mode->Info->HorizontalResolution - BmpHeader->PixelWidth) / 2;
|
||||
bgrt->image_offset_y = ((GraphicsOutput->Mode->Info->VerticalResolution * 382) / 1000) -
|
||||
(BmpHeader->PixelHeight / 2);
|
||||
DEBUG ((EFI_D_INFO, "HackBGRT Set checksum\n"));
|
||||
SetAcpiSdtChecksum(bgrt);
|
||||
DEBUG ((EFI_D_INFO, "HackBGRT Add Table\n"));
|
||||
HandleAcpiTables(bgrt);
|
||||
} else {
|
||||
DEBUG ((EFI_D_INFO, "HackBGRT no display connected, skip adding table\n"));
|
||||
}
|
||||
}
|
@ -175,7 +175,7 @@ BootLogoEnableLogo (
|
||||
break;
|
||||
case EdkiiPlatformLogoDisplayAttributeCenter:
|
||||
DestX = (SizeOfX - Image.Width) / 2;
|
||||
DestY = (SizeOfY - Image.Height) / 2;
|
||||
DestY = (SizeOfY * 382) / 1000 - Image.Height / 2;
|
||||
break;
|
||||
case EdkiiPlatformLogoDisplayAttributeCenterRight:
|
||||
DestX = SizeOfX - Image.Width;
|
||||
|
@ -24,6 +24,7 @@
|
||||
#
|
||||
|
||||
[Sources]
|
||||
Bgrt.c
|
||||
BootLogoLib.c
|
||||
|
||||
[Packages]
|
||||
@ -48,5 +49,12 @@
|
||||
gEfiUserManagerProtocolGuid ## CONSUMES
|
||||
gEdkiiPlatformLogoProtocolGuid ## CONSUMES
|
||||
|
||||
[Guids]
|
||||
gEfiAcpiTableGuid ## CONSUMES ## GUID
|
||||
gEfiAcpi20TableGuid ## CONSUMES ## GUID
|
||||
|
||||
[FeaturePcd]
|
||||
gEfiMdePkgTokenSpaceGuid.PcdUgaConsumeSupport ## CONSUMES
|
||||
|
||||
[Pcd]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdLogoFile ## CONSUMES
|
||||
|
@ -722,6 +722,7 @@ BootMaintExtractConfig (
|
||||
*Progress = Request + StrLen (Request);
|
||||
}
|
||||
|
||||
DEBUG ((EFI_D_INFO, "%a complete: %r\n", __FUNCTION__, Status));
|
||||
return Status;
|
||||
}
|
||||
|
||||
@ -1033,6 +1034,7 @@ BootMaintRouteConfig (
|
||||
//
|
||||
CopyMem (OldBmmData, NewBmmData, sizeof (BMM_FAKE_NV_DATA));
|
||||
|
||||
DEBUG ((EFI_D_INFO, "%a complete: %r\n", __FUNCTION__, Status));
|
||||
return EFI_SUCCESS;
|
||||
|
||||
Exit:
|
||||
@ -1093,6 +1095,8 @@ BootMaintCallback (
|
||||
Private = BMM_CALLBACK_DATA_FROM_THIS (This);
|
||||
|
||||
if (Action == EFI_BROWSER_ACTION_FORM_OPEN) {
|
||||
DEBUG ((EFI_D_INFO, "EFI_BROWSER_ACTION_FORM_OPEN: 0x%0X\n", QuestionId));
|
||||
|
||||
if (QuestionId == KEY_VALUE_TRIGGER_FORM_OPEN_ACTION) {
|
||||
if (!mFirstEnterBMMForm) {
|
||||
//
|
||||
@ -1104,7 +1108,9 @@ BootMaintCallback (
|
||||
// 1. Update the menus (including legacy munu) show in BootMiantenanceManager page.
|
||||
// 2. Re-scan the BootOption menus (including the legacy boot option).
|
||||
//
|
||||
CustomizeMenus ();
|
||||
//CustomizeMenus ();
|
||||
UpdatePageId (Private, FORM_BOOT_CHG_ID);
|
||||
UpdatePageBody (FORM_BOOT_CHG_ID, Private);
|
||||
EfiBootManagerRefreshAllBootOption ();
|
||||
BOpt_GetBootOptions (Private);
|
||||
mFirstEnterBMMForm = TRUE;
|
||||
@ -1119,6 +1125,8 @@ BootMaintCallback (
|
||||
HiiGetBrowserData (&mBootMaintGuid, mBootMaintStorageName, sizeof (BMM_FAKE_NV_DATA), (UINT8 *) CurrentFakeNVMap);
|
||||
|
||||
if (Action == EFI_BROWSER_ACTION_CHANGING) {
|
||||
DEBUG ((EFI_D_INFO, "EFI_BROWSER_ACTION_CHANGING: 0x%0X\n", QuestionId));
|
||||
|
||||
if (Value == NULL) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
@ -1204,6 +1212,8 @@ BootMaintCallback (
|
||||
ChooseFile (NULL, L".efi", BootFromFile, &File);
|
||||
}
|
||||
} else if (Action == EFI_BROWSER_ACTION_CHANGED) {
|
||||
DEBUG ((EFI_D_INFO, "EFI_BROWSER_ACTION_CHANGED: 0x%0X\n", QuestionId));
|
||||
|
||||
if ((Value == NULL) || (ActionRequest == NULL)) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
@ -1243,6 +1253,11 @@ BootMaintCallback (
|
||||
CurrentFakeNVMap->DriverOptionChanged = TRUE;
|
||||
}
|
||||
|
||||
if (QuestionId == BOOT_OPTION_ORDER_QUESTION_ID) {
|
||||
// Save BootOrder on list update
|
||||
*ActionRequest = EFI_BROWSER_ACTION_REQUEST_FORM_APPLY;
|
||||
}
|
||||
|
||||
if ((QuestionId >= BOOT_OPTION_DEL_QUESTION_ID) && (QuestionId < BOOT_OPTION_DEL_QUESTION_ID + MAX_MENU_NUMBER)) {
|
||||
if (Value->b){
|
||||
//
|
||||
@ -1306,6 +1321,7 @@ BootMaintCallback (
|
||||
//
|
||||
HiiSetBrowserData (&mBootMaintGuid, mBootMaintStorageName, sizeof (BMM_FAKE_NV_DATA), (UINT8 *) CurrentFakeNVMap, NULL);
|
||||
|
||||
DEBUG ((EFI_D_INFO, "%a complete: %r\n", __FUNCTION__, EFI_SUCCESS));
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
@ -1630,6 +1646,28 @@ BmmInitialBootModeInfo (
|
||||
mBmmModeInitialized = TRUE;
|
||||
}
|
||||
|
||||
STATIC
|
||||
EFI_STATUS
|
||||
UnregisterHotKeys(VOID)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_INPUT_KEY HotKey;
|
||||
EDKII_FORM_BROWSER_EXTENSION2_PROTOCOL *FormBrowserEx2;
|
||||
|
||||
Status = gBS->LocateProtocol (&gEdkiiFormBrowserEx2ProtocolGuid, NULL, (VOID **) &FormBrowserEx2);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
HotKey.UnicodeChar = CHAR_NULL;
|
||||
|
||||
HotKey.ScanCode = SCAN_F9;
|
||||
FormBrowserEx2->RegisterHotKey(&HotKey, BROWSER_ACTION_UNREGISTER, 0, NULL);
|
||||
|
||||
HotKey.ScanCode = SCAN_F10;
|
||||
FormBrowserEx2->RegisterHotKey(&HotKey, BROWSER_ACTION_UNREGISTER, 0, NULL);
|
||||
}
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
/**
|
||||
|
||||
Install Boot Maintenance Manager Menu driver.
|
||||
@ -1705,8 +1743,8 @@ BootMaintenanceManagerUiLibConstructor (
|
||||
|
||||
mBmmCallbackInfo->MenuEntry = (BM_MENU_ENTRY *) Ptr;
|
||||
|
||||
mBmmCallbackInfo->BmmPreviousPageId = FORM_MAIN_ID;
|
||||
mBmmCallbackInfo->BmmCurrentPageId = FORM_MAIN_ID;
|
||||
mBmmCallbackInfo->BmmPreviousPageId = FORM_BOOT_CHG_ID;
|
||||
mBmmCallbackInfo->BmmCurrentPageId = FORM_BOOT_CHG_ID;
|
||||
|
||||
InitAllMenu (mBmmCallbackInfo);
|
||||
|
||||
@ -1718,6 +1756,11 @@ BootMaintenanceManagerUiLibConstructor (
|
||||
|
||||
BmmInitialBootModeInfo();
|
||||
|
||||
//
|
||||
// Remove the F9 and F10 hotkeys
|
||||
//
|
||||
UnregisterHotKeys();
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
@ -19,19 +19,28 @@ formset
|
||||
name = BmmData,
|
||||
guid = BOOT_MAINT_FORMSET_GUID;
|
||||
|
||||
form formid = FORM_BOOT_CHG_ID,
|
||||
title = STRING_TOKEN(STR_FORM_BOOT_CHG_TITLE);
|
||||
|
||||
//
|
||||
// Add this invisible text in order to indicate enter Boot Maintenance Manager form.
|
||||
// To trigger the form open action.
|
||||
//
|
||||
suppressif TRUE;
|
||||
text
|
||||
help = STRING_TOKEN(STR_NONE),
|
||||
text = STRING_TOKEN(STR_NONE),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_TRIGGER_FORM_OPEN_ACTION;
|
||||
endif;
|
||||
|
||||
label FORM_BOOT_CHG_ID;
|
||||
label LABEL_END;
|
||||
|
||||
endform;
|
||||
|
||||
form formid = FORM_MAIN_ID,
|
||||
title = STRING_TOKEN(STR_FORM_MAIN_TITLE);
|
||||
//
|
||||
// Add this invisible text in order to indicate enter Boot Maintenance Manager form.
|
||||
// To trigger the form open action.
|
||||
//
|
||||
suppressif TRUE;
|
||||
text
|
||||
help = STRING_TOKEN(STR_NONE),
|
||||
text = STRING_TOKEN(STR_NONE),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_TRIGGER_FORM_OPEN_ACTION;
|
||||
endif;
|
||||
|
||||
label LABEL_FORM_MAIN_START;
|
||||
//
|
||||
@ -148,14 +157,6 @@ formset
|
||||
label LABEL_END;
|
||||
endform;
|
||||
|
||||
form formid = FORM_BOOT_CHG_ID,
|
||||
title = STRING_TOKEN(STR_FORM_BOOT_CHG_TITLE);
|
||||
|
||||
label FORM_BOOT_CHG_ID;
|
||||
label LABEL_END;
|
||||
|
||||
endform;
|
||||
|
||||
form formid = FORM_DRV_ADD_ID,
|
||||
title = STRING_TOKEN(STR_FORM_DRV_ADD_TITLE);
|
||||
|
||||
|
@ -17,11 +17,11 @@
|
||||
#language fr-FR "NONE"
|
||||
#string STR_MISSING_STRING #language en-US "Missing String"
|
||||
#language fr-FR "Missing String"
|
||||
#string STR_FORM_MAIN_TITLE #language en-US "Boot Maintenance Manager"
|
||||
#string STR_FORM_MAIN_TITLE #language en-US "Change Boot Order"
|
||||
#language fr-FR "Boot Maintenance Manager"
|
||||
#string STR_FORM_BOOT_SETUP_TITLE #language en-US "Boot Options"
|
||||
#language fr-FR "Boot Options"
|
||||
#string STR_BOOT_MAINT_MANAGER_HELP #language en-US "This selection will take you to the Boot Maintenance Manager"
|
||||
#string STR_BOOT_MAINT_MANAGER_HELP #language en-US "Change the order of boot entries"
|
||||
#language fr-FR "This selection will take you to the Boot Maintenance Manager"
|
||||
#string STR_FORM_BOOT_SETUP_HELP #language en-US "Modify system boot options"
|
||||
#language fr-FR "Modify system boot options"
|
||||
@ -251,7 +251,7 @@
|
||||
#language fr-FR "Boot system from a file or device"
|
||||
#string STR_OPTIONAL_DATA #language en-US "Input Optional Data"
|
||||
#language fr-FR "Input Optional Data"
|
||||
#string STR_CHANGE_ORDER #language en-US "Change the order"
|
||||
#string STR_CHANGE_ORDER #language en-US "Change Boot Order"
|
||||
#language fr-FR "Change the order"
|
||||
#string STR_BOOT_LEGACY #language en-US "Boot Legacy System"
|
||||
#language fr-FR "Boot Legacy System"
|
||||
|
@ -112,40 +112,6 @@ UpdatePageEnd (
|
||||
IN BMM_CALLBACK_DATA *CallbackData
|
||||
)
|
||||
{
|
||||
//
|
||||
// Create the "Apply changes" and "Discard changes" tags.
|
||||
//
|
||||
if (CallbackData->BmmAskSaveOrNot) {
|
||||
HiiCreateSubTitleOpCode (
|
||||
mStartOpCodeHandle,
|
||||
STRING_TOKEN (STR_NULL_STRING),
|
||||
0,
|
||||
0,
|
||||
0
|
||||
);
|
||||
|
||||
HiiCreateActionOpCode (
|
||||
mStartOpCodeHandle,
|
||||
KEY_VALUE_SAVE_AND_EXIT,
|
||||
STRING_TOKEN (STR_SAVE_AND_EXIT),
|
||||
STRING_TOKEN (STR_NULL_STRING),
|
||||
EFI_IFR_FLAG_CALLBACK,
|
||||
0
|
||||
);
|
||||
}
|
||||
|
||||
//
|
||||
// Ensure user can return to the main page.
|
||||
//
|
||||
HiiCreateActionOpCode (
|
||||
mStartOpCodeHandle,
|
||||
KEY_VALUE_NO_SAVE_AND_EXIT,
|
||||
STRING_TOKEN (STR_NO_SAVE_AND_EXIT),
|
||||
STRING_TOKEN (STR_NULL_STRING),
|
||||
EFI_IFR_FLAG_CALLBACK,
|
||||
0
|
||||
);
|
||||
|
||||
HiiUpdateForm (
|
||||
CallbackData->BmmHiiHandle,
|
||||
&mBootMaintGuid,
|
||||
@ -642,7 +608,7 @@ UpdateOrderPage (
|
||||
VarOffset, // Offset in Buffer Storage
|
||||
STRING_TOKEN (STR_CHANGE_ORDER), // Question prompt text
|
||||
STRING_TOKEN (STR_CHANGE_ORDER), // Question help text
|
||||
0, // Question flag
|
||||
EFI_IFR_FLAG_CALLBACK, // Question flag
|
||||
0, // Ordered list flag, e.g. EFI_IFR_UNIQUE_SET
|
||||
EFI_IFR_TYPE_NUM_SIZE_32, // Data type of Question value
|
||||
100, // Maximum container
|
||||
@ -1143,8 +1109,8 @@ UpdatePageId (
|
||||
NewPageId = FORM_CON_COM_SETUP_ID;
|
||||
}
|
||||
|
||||
if ((NewPageId > 0) && (NewPageId < MAXIMUM_FORM_ID)) {
|
||||
Private->BmmPreviousPageId = Private->BmmCurrentPageId;
|
||||
Private->BmmCurrentPageId = NewPageId;
|
||||
}
|
||||
//if ((NewPageId > 0) && (NewPageId < MAXIMUM_FORM_ID)) {
|
||||
// Private->BmmPreviousPageId = Private->BmmCurrentPageId;
|
||||
// Private->BmmCurrentPageId = NewPageId;
|
||||
//}
|
||||
}
|
||||
|
@ -631,6 +631,7 @@ Var_UpdateBootOrder (
|
||||
BOpt_FreeMenu (&BootOptionMenu);
|
||||
BOpt_GetBootOptions (CallbackData);
|
||||
|
||||
DEBUG ((EFI_D_INFO, "Updated BootOrder: %r\n", Status));
|
||||
return Status;
|
||||
|
||||
}
|
||||
|
@ -8,6 +8,8 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
#include "BootManager.h"
|
||||
|
||||
#include <Protocol/BlockIo.h>
|
||||
|
||||
UINT16 mKeyInput;
|
||||
EFI_GUID mBootManagerGuid = BOOT_MANAGER_FORMSET_GUID;
|
||||
//
|
||||
@ -27,6 +29,10 @@ UINT32 mBmSetupVerticalResolution = 0;
|
||||
|
||||
BOOLEAN mBmModeInitialized = FALSE;
|
||||
|
||||
STATIC EFI_EVENT mBmRefreshEvent;
|
||||
STATIC CONST EFI_GUID mBmRefreshGuid = BOOT_MANAGER_REFRESH_GUID;
|
||||
STATIC VOID *mBlockIoRegistration; // Unused
|
||||
|
||||
CHAR16 *mDeviceTypeStr[] = {
|
||||
L"Legacy BEV",
|
||||
L"Legacy Floppy",
|
||||
@ -484,22 +490,10 @@ UpdateBootManager (
|
||||
BOOLEAN IsLegacyOption;
|
||||
BOOLEAN NeedEndOp;
|
||||
UINTN MaxLen;
|
||||
UINTN OptionCount = 0;
|
||||
|
||||
DeviceType = (UINT16) -1;
|
||||
|
||||
//
|
||||
// for better user experience
|
||||
// 1. User changes HD configuration (e.g.: unplug HDD), here we have a chance to remove the HDD boot option
|
||||
// 2. User enables/disables UEFI PXE, here we have a chance to add/remove EFI Network boot option
|
||||
//
|
||||
EfiBootManagerRefreshAllBootOption ();
|
||||
|
||||
//
|
||||
// BdsDxe doesn't group the legacy boot options for the same device type
|
||||
// It's UI's choice.
|
||||
//
|
||||
GroupMultipleLegacyBootOption4SameType ();
|
||||
|
||||
BootOption = EfiBootManagerGetLoadOptions (&BootOptionCount, LoadOptionTypeBoot);
|
||||
|
||||
HiiHandle = gBootManagerPrivate.HiiHandle;
|
||||
@ -526,6 +520,7 @@ UpdateBootManager (
|
||||
EndLabel = (EFI_IFR_GUID_LABEL *) HiiCreateGuidOpCode (EndOpCodeHandle, &gEfiIfrTianoGuid, NULL, sizeof (EFI_IFR_GUID_LABEL));
|
||||
EndLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL;
|
||||
EndLabel->Number = LABEL_BOOT_OPTION_END;
|
||||
|
||||
mKeyInput = 0;
|
||||
NeedEndOp = FALSE;
|
||||
for (Index = 0; Index < BootOptionCount; Index++) {
|
||||
@ -541,6 +536,8 @@ UpdateBootManager (
|
||||
continue;
|
||||
}
|
||||
|
||||
OptionCount++;
|
||||
|
||||
//
|
||||
// Group the legacy boot option in the sub title created dynamically
|
||||
//
|
||||
@ -596,6 +593,10 @@ UpdateBootManager (
|
||||
);
|
||||
}
|
||||
|
||||
if (OptionCount == 0) {
|
||||
HiiCreateSubTitleOpCode (StartOpCodeHandle, STRING_TOKEN (STR_NO_BOOTABLE_MEDIA), 0, 0, 0);
|
||||
}
|
||||
|
||||
if (NeedEndOp) {
|
||||
HiiCreateEndOpCode (StartOpCodeHandle);
|
||||
}
|
||||
@ -787,7 +788,6 @@ BootManagerCallback (
|
||||
{
|
||||
EFI_BOOT_MANAGER_LOAD_OPTION *BootOption;
|
||||
UINTN BootOptionCount;
|
||||
EFI_INPUT_KEY Key;
|
||||
|
||||
if (Action == EFI_BROWSER_ACTION_FORM_OPEN) {
|
||||
//
|
||||
@ -831,19 +831,31 @@ BootManagerCallback (
|
||||
EfiBootManagerBoot (&BootOption[QuestionId - 1]);
|
||||
BmSetConsoleMode (TRUE);
|
||||
|
||||
if (EFI_ERROR (BootOption[QuestionId - 1].Status)) {
|
||||
gST->ConOut->OutputString (
|
||||
gST->ConOut,
|
||||
HiiGetString (gBootManagerPrivate.HiiHandle, STRING_TOKEN (STR_ANY_KEY_CONTINUE), NULL)
|
||||
);
|
||||
gST->ConIn->ReadKeyStroke (gST->ConIn, &Key);
|
||||
}
|
||||
|
||||
EfiBootManagerFreeLoadOptions (BootOption, BootOptionCount);
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
STATIC
|
||||
VOID
|
||||
EFIAPI
|
||||
RefreshBootOptions(
|
||||
IN EFI_EVENT Event,
|
||||
IN VOID *Context
|
||||
)
|
||||
{
|
||||
EFI_TPL OldTpl = gBS->RaiseTPL(TPL_CALLBACK);
|
||||
|
||||
EfiBootManagerRefreshAllBootOption();
|
||||
|
||||
// BdsDxe doesn't group the legacy boot options for the same device type. It's UI's choice.
|
||||
GroupMultipleLegacyBootOption4SameType();
|
||||
|
||||
UpdateBootManager();
|
||||
|
||||
gBS->RestoreTPL (OldTpl);
|
||||
}
|
||||
|
||||
/**
|
||||
|
||||
Install Boot Manager Menu driver.
|
||||
@ -892,6 +904,23 @@ BootManagerUiLibConstructor (
|
||||
|
||||
BmInitialBootModeInfo ();
|
||||
|
||||
Status = gBS->CreateEventEx(
|
||||
EVT_NOTIFY_SIGNAL,
|
||||
TPL_CALLBACK,
|
||||
RefreshBootOptions,
|
||||
NULL,
|
||||
&mBmRefreshGuid,
|
||||
&mBmRefreshEvent
|
||||
);
|
||||
ASSERT_EFI_ERROR(Status);
|
||||
|
||||
Status = gBS->RegisterProtocolNotify (
|
||||
&gEfiBlockIoProtocolGuid,
|
||||
mBmRefreshEvent,
|
||||
&mBlockIoRegistration
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
@ -912,6 +941,8 @@ BootManagerUiLibDestructor (
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
|
||||
gBS->CloseEvent(mBmRefreshEvent);
|
||||
|
||||
Status = gBS->UninstallMultipleProtocolInterfaces (
|
||||
gBootManagerPrivate.DriverHandle,
|
||||
&gEfiDevicePathProtocolGuid,
|
||||
|
@ -46,7 +46,12 @@ typedef struct {
|
||||
0x847bc3fe, 0xb974, 0x446d, {0x94, 0x49, 0x5a, 0xd5, 0x41, 0x2e, 0x99, 0x3b} \
|
||||
}
|
||||
|
||||
#define BOOT_MANAGER_FORM_ID 0x1000
|
||||
#define BOOT_MANAGER_REFRESH_GUID \
|
||||
{ \
|
||||
0x7648C827, 0xBE32, 0x44D2, { 0xA1, 0x33, 0xF1, 0x7F, 0x93, 0x76, 0xC7, 0x00 } \
|
||||
}
|
||||
|
||||
#define BOOT_MANAGER_FORM_ID 0x1030
|
||||
|
||||
#define LABEL_BOOT_OPTION 0x00
|
||||
#define LABEL_BOOT_OPTION_END 0x01
|
||||
|
@ -17,20 +17,9 @@
|
||||
|
||||
/=#
|
||||
#langdef en-US "English"
|
||||
#langdef fr-FR "Français"
|
||||
|
||||
#string STR_BM_BANNER #language en-US "Boot Manager"
|
||||
#language fr-FR "Boot Manager"
|
||||
#string STR_BOOT_MANAGER_HELP #language en-US "This selection will take you to the Boot Manager"
|
||||
#language fr-FR "This selection will take you to the Boot Manager"
|
||||
#string STR_HELP_FOOTER #language en-US "Use the <↑> and <↓> keys to choose a boot option, the <Enter> key to select a boot option, and the <Esc> key to exit the Boot Manager Menu."
|
||||
#language fr-FR "<↑> pour <↓> changer l'option, <ENTRER> choisir une option, <ESC> pour sortir"
|
||||
#string STR_AND #language en-US " and "
|
||||
#language fr-FR " et "
|
||||
#string STR_BOOT_OPTION_BANNER #language en-US "Boot Manager Menu"
|
||||
#language fr-FR "le Menu d'Option de Botte"
|
||||
#string STR_BM_BANNER #language en-US "One Time Boot"
|
||||
#string STR_BOOT_MANAGER_HELP #language en-US "Boot an entry one time"
|
||||
#string STR_ANY_KEY_CONTINUE #language en-US "Press any key to continue..."
|
||||
#language fr-FR "Appuie n'importe quelle pour continuer..."
|
||||
#string STR_LAST_STRING #language en-US ""
|
||||
#language fr-FR ""
|
||||
|
||||
#string STR_NO_BOOTABLE_MEDIA #language en-US "No bootable media found"
|
||||
#string STR_EMPTY_STRING #language en-US ""
|
||||
|
@ -51,6 +51,7 @@
|
||||
gEfiHiiConfigAccessProtocolGuid ## CONSUMES
|
||||
gEfiDevicePathToTextProtocolGuid ## CONSUMES
|
||||
gEdkiiFormBrowserEx2ProtocolGuid ## CONSUMES
|
||||
gEfiBlockIoProtocolGuid
|
||||
|
||||
[FeaturePcd]
|
||||
|
||||
|
@ -7,8 +7,9 @@
|
||||
//
|
||||
//**/
|
||||
#define FORMSET_GUID { 0x847bc3fe, 0xb974, 0x446d, 0x94, 0x49, 0x5a, 0xd5, 0x41, 0x2e, 0x99, 0x3b }
|
||||
#define BOOT_MANAGER_REFRESH_GUID { 0x7648C827, 0xBE32, 0x44D2, { 0xA1, 0x33, 0xF1, 0x7F, 0x93, 0x76, 0xC7, 0x00 }}
|
||||
|
||||
#define BOOT_MANAGER_FORM_ID 0x1000
|
||||
#define BOOT_MANAGER_FORM_ID 0x1030
|
||||
|
||||
#define LABEL_BOOT_OPTION 0x00
|
||||
#define LABEL_BOOT_OPTION_END 0x01
|
||||
@ -20,22 +21,19 @@ formset
|
||||
classguid = gEfiIfrFrontPageGuid,
|
||||
|
||||
form formid = BOOT_MANAGER_FORM_ID,
|
||||
title = STRING_TOKEN(STR_BM_BANNER);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_LAST_STRING);
|
||||
subtitle text = STRING_TOKEN(STR_BOOT_OPTION_BANNER);
|
||||
subtitle text = STRING_TOKEN(STR_LAST_STRING);
|
||||
title = STRING_TOKEN(STR_BM_BANNER);
|
||||
refreshguid = BOOT_MANAGER_REFRESH_GUID;
|
||||
|
||||
//
|
||||
//Add this invisable text in order to indicate enter Boot Manager form.
|
||||
//
|
||||
suppressif TRUE;
|
||||
text
|
||||
help = STRING_TOKEN(STR_LAST_STRING ),
|
||||
text = STRING_TOKEN(STR_LAST_STRING ),
|
||||
flags = INTERACTIVE,
|
||||
key = 0x1212;
|
||||
endif;
|
||||
text
|
||||
help = STRING_TOKEN(STR_EMPTY_STRING),
|
||||
text = STRING_TOKEN(STR_EMPTY_STRING),
|
||||
flags = INTERACTIVE,
|
||||
key = 0x1212;
|
||||
endif;
|
||||
|
||||
//
|
||||
// This is where we will dynamically add choices for the Boot Manager
|
||||
@ -43,9 +41,6 @@ formset
|
||||
label LABEL_BOOT_OPTION;
|
||||
label LABEL_BOOT_OPTION_END;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_LAST_STRING);
|
||||
subtitle text = STRING_TOKEN(STR_HELP_FOOTER);
|
||||
|
||||
endform;
|
||||
|
||||
endformset;
|
||||
|
@ -1 +1 @@
|
||||
Subproject commit 666c3280cc11dc433c303d79a83d4ffbdd12cc8d
|
||||
Subproject commit aa7b018dcbf2e9eb8cfdc2e2cacec82b25707faa
|
@ -1779,6 +1779,9 @@ EfiBootManagerBoot (
|
||||
UINTN FileSize;
|
||||
EFI_BOOT_LOGO_PROTOCOL *BootLogo;
|
||||
EFI_EVENT LegacyBootEvent;
|
||||
EFI_INPUT_KEY Key;
|
||||
UINTN Index;
|
||||
UINT8 *SecureBoot;
|
||||
|
||||
if (BootOption == NULL) {
|
||||
return;
|
||||
@ -1914,6 +1917,38 @@ EfiBootManagerBoot (
|
||||
//
|
||||
BmReportLoadFailure (EFI_SW_DXE_BS_EC_BOOT_OPTION_LOAD_ERROR, Status);
|
||||
BootOption->Status = Status;
|
||||
|
||||
if (gST->ConOut != NULL) {
|
||||
gST->ConOut->ClearScreen (gST->ConOut);
|
||||
|
||||
//
|
||||
// When UEFI Secure Boot is enabled, unsigned modules won't load.
|
||||
//
|
||||
SecureBoot = NULL;
|
||||
GetEfiGlobalVariable2 (EFI_SECURE_BOOT_MODE_NAME, (VOID**)&SecureBoot, NULL);
|
||||
if ((SecureBoot != NULL) && (*SecureBoot == SECURE_BOOT_MODE_ENABLE)) {
|
||||
AsciiPrint ("SecureBoot is enabled.\n");
|
||||
} else {
|
||||
AsciiPrint ("SecureBoot is disabled.\n");
|
||||
}
|
||||
|
||||
if (SecureBoot != NULL) {
|
||||
FreePool (SecureBoot);
|
||||
}
|
||||
|
||||
AsciiPrint (
|
||||
"Booting from '%s' failed; verify it contains a 64-bit UEFI OS.\n"
|
||||
"\nPress any key to continue booting...\n",
|
||||
BootOption->Description);
|
||||
|
||||
}
|
||||
if (gST->ConIn != NULL) {
|
||||
Status = gBS->WaitForEvent (1, &gST->ConIn->WaitForKey, &Index);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
ASSERT (Index == 0);
|
||||
while (!EFI_ERROR (gST->ConIn->ReadKeyStroke (gST->ConIn, &Key))) {}
|
||||
}
|
||||
|
||||
return;
|
||||
}
|
||||
}
|
||||
@ -2116,12 +2151,14 @@ BmEnumerateBootOptions (
|
||||
EFI_BLOCK_IO_PROTOCOL *BlkIo;
|
||||
UINTN Removable;
|
||||
UINTN Index;
|
||||
UINTN EmmcCount;
|
||||
CHAR16 *Description;
|
||||
|
||||
ASSERT (BootOptionCount != NULL);
|
||||
|
||||
*BootOptionCount = 0;
|
||||
BootOptions = NULL;
|
||||
EmmcCount = 0;
|
||||
|
||||
//
|
||||
// Parse removable block io followed by fixed block io
|
||||
@ -2160,6 +2197,17 @@ BmEnumerateBootOptions (
|
||||
}
|
||||
|
||||
Description = BmGetBootDescription (Handles[Index]);
|
||||
|
||||
//
|
||||
// Skip secondary entries for internal eMMC devices
|
||||
//
|
||||
if (StrCmp(Description, L"eMMC Device") == 0) {
|
||||
EmmcCount++;
|
||||
if (EmmcCount > 1) {
|
||||
continue;
|
||||
}
|
||||
}
|
||||
|
||||
BootOptions = ReallocatePool (
|
||||
sizeof (EFI_BOOT_MANAGER_LOAD_OPTION) * (*BootOptionCount),
|
||||
sizeof (EFI_BOOT_MANAGER_LOAD_OPTION) * (*BootOptionCount + 1),
|
||||
|
@ -15,7 +15,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#define PRODUCT_IDENTIFICATION_LENGTH 16
|
||||
|
||||
CONST UINT16 mBmUsbLangId = 0x0409; // English
|
||||
CHAR16 mBmUefiPrefix[] = L"UEFI ";
|
||||
|
||||
LIST_ENTRY mPlatformBootDescriptionHandlers = INITIALIZE_LIST_HEAD_VARIABLE (mPlatformBootDescriptionHandlers);
|
||||
|
||||
@ -144,9 +143,8 @@ BmGetDescriptionFromDiskInfo (
|
||||
EFI_ATAPI_IDENTIFY_DATA IdentifyData;
|
||||
EFI_SCSI_INQUIRY_DATA InquiryData;
|
||||
CHAR16 *Description;
|
||||
UINTN Length;
|
||||
CHAR16 *DescTemp;
|
||||
CONST UINTN ModelNameLength = 40;
|
||||
CONST UINTN SerialNumberLength = 20;
|
||||
CHAR8 *StrPtr;
|
||||
UINT8 Temp;
|
||||
EFI_DEVICE_PATH_PROTOCOL *DevicePath;
|
||||
@ -171,25 +169,19 @@ BmGetDescriptionFromDiskInfo (
|
||||
&BufferSize
|
||||
);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
Description = AllocateZeroPool ((ModelNameLength + SerialNumberLength + 2) * sizeof (CHAR16));
|
||||
Description = AllocateZeroPool (ModelNameLength * sizeof (CHAR16));
|
||||
ASSERT (Description != NULL);
|
||||
for (Index = 0; Index + 1 < ModelNameLength; Index += 2) {
|
||||
Description[Index] = (CHAR16) IdentifyData.ModelName[Index + 1];
|
||||
Description[Index + 1] = (CHAR16) IdentifyData.ModelName[Index];
|
||||
}
|
||||
|
||||
Length = Index;
|
||||
Description[Length++] = L' ';
|
||||
|
||||
for (Index = 0; Index + 1 < SerialNumberLength; Index += 2) {
|
||||
Description[Length + Index] = (CHAR16) IdentifyData.SerialNo[Index + 1];
|
||||
Description[Length + Index + 1] = (CHAR16) IdentifyData.SerialNo[Index];
|
||||
}
|
||||
Length += Index;
|
||||
Description[Length++] = L'\0';
|
||||
ASSERT (Length == ModelNameLength + SerialNumberLength + 2);
|
||||
|
||||
Description[Index] = L'\0';
|
||||
BmEliminateExtraSpaces (Description);
|
||||
|
||||
DescTemp = AllocateZeroPool (0x60);
|
||||
StrCatS (DescTemp, 0x60 / sizeof (CHAR16), Description);
|
||||
StrCpyS(Description, StrSize (DescTemp) / sizeof (CHAR16), DescTemp);
|
||||
FreePool (DescTemp);
|
||||
}
|
||||
} else if (CompareGuid (&DiskInfo->Interface, &gEfiDiskInfoScsiInterfaceGuid)) {
|
||||
BufferSize = sizeof (EFI_SCSI_INQUIRY_DATA);
|
||||
@ -268,7 +260,6 @@ BmGetUsbDescription (
|
||||
CHAR16 NullChar;
|
||||
CHAR16 *Manufacturer;
|
||||
CHAR16 *Product;
|
||||
CHAR16 *SerialNumber;
|
||||
CHAR16 *Description;
|
||||
EFI_USB_DEVICE_DESCRIPTOR DevDesc;
|
||||
UINTN DescMaxSize;
|
||||
@ -309,24 +300,12 @@ BmGetUsbDescription (
|
||||
Product = &NullChar;
|
||||
}
|
||||
|
||||
Status = UsbIo->UsbGetStringDescriptor (
|
||||
UsbIo,
|
||||
mBmUsbLangId,
|
||||
DevDesc.StrSerialNumber,
|
||||
&SerialNumber
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
SerialNumber = &NullChar;
|
||||
}
|
||||
|
||||
if ((Manufacturer == &NullChar) &&
|
||||
(Product == &NullChar) &&
|
||||
(SerialNumber == &NullChar)
|
||||
) {
|
||||
(Product == &NullChar)) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
DescMaxSize = StrSize (Manufacturer) + StrSize (Product) + StrSize (SerialNumber);
|
||||
DescMaxSize = StrSize (Manufacturer) + StrSize (Product);
|
||||
Description = AllocateZeroPool (DescMaxSize);
|
||||
ASSERT (Description != NULL);
|
||||
StrCatS (Description, DescMaxSize/sizeof(CHAR16), Manufacturer);
|
||||
@ -335,17 +314,12 @@ BmGetUsbDescription (
|
||||
StrCatS (Description, DescMaxSize/sizeof(CHAR16), Product);
|
||||
StrCatS (Description, DescMaxSize/sizeof(CHAR16), L" ");
|
||||
|
||||
StrCatS (Description, DescMaxSize/sizeof(CHAR16), SerialNumber);
|
||||
|
||||
if (Manufacturer != &NullChar) {
|
||||
FreePool (Manufacturer);
|
||||
}
|
||||
if (Product != &NullChar) {
|
||||
FreePool (Product);
|
||||
}
|
||||
if (SerialNumber != &NullChar) {
|
||||
FreePool (SerialNumber);
|
||||
}
|
||||
|
||||
BmEliminateExtraSpaces (Description);
|
||||
|
||||
@ -564,6 +538,7 @@ BmGetNvmeDescription (
|
||||
EFI_NVM_EXPRESS_COMPLETION Completion;
|
||||
NVME_ADMIN_CONTROLLER_DATA ControllerData;
|
||||
CHAR16 *Description;
|
||||
CHAR16 *DescTemp;
|
||||
CHAR16 *Char;
|
||||
UINTN Index;
|
||||
|
||||
@ -630,16 +605,11 @@ BmGetNvmeDescription (
|
||||
for (Index = 0; Index < ARRAY_SIZE (ControllerData.Mn); Index++) {
|
||||
*(Char++) = (CHAR16) ControllerData.Mn[Index];
|
||||
}
|
||||
*(Char++) = L' ';
|
||||
for (Index = 0; Index < ARRAY_SIZE (ControllerData.Sn); Index++) {
|
||||
*(Char++) = (CHAR16) ControllerData.Sn[Index];
|
||||
}
|
||||
*(Char++) = L' ';
|
||||
UnicodeValueToStringS (
|
||||
Char, sizeof (CHAR16) * (MAXIMUM_VALUE_CHARACTERS + 1),
|
||||
0, DevicePath.NvmeNamespace->NamespaceId, 0
|
||||
);
|
||||
BmEliminateExtraSpaces (Description);
|
||||
DescTemp = AllocateZeroPool (0x60);
|
||||
StrCatS (DescTemp, 0x60 / sizeof (CHAR16), Description);
|
||||
StrCpyS(Description, StrSize (DescTemp) / sizeof (CHAR16), DescTemp);
|
||||
FreePool (DescTemp);
|
||||
}
|
||||
|
||||
return Description;
|
||||
@ -771,7 +741,6 @@ BmGetBootDescription (
|
||||
BM_BOOT_DESCRIPTION_ENTRY *Entry;
|
||||
CHAR16 *Description;
|
||||
CHAR16 *DefaultDescription;
|
||||
CHAR16 *Temp;
|
||||
UINTN Index;
|
||||
|
||||
//
|
||||
@ -781,16 +750,6 @@ BmGetBootDescription (
|
||||
for (Index = 0; Index < ARRAY_SIZE (mBmBootDescriptionHandlers); Index++) {
|
||||
DefaultDescription = mBmBootDescriptionHandlers[Index] (Handle);
|
||||
if (DefaultDescription != NULL) {
|
||||
//
|
||||
// Avoid description confusion between UEFI & Legacy boot option by adding "UEFI " prefix
|
||||
// ONLY for core provided boot description handler.
|
||||
//
|
||||
Temp = AllocatePool (StrSize (DefaultDescription) + sizeof (mBmUefiPrefix));
|
||||
ASSERT (Temp != NULL);
|
||||
StrCpyS (Temp, (StrSize (DefaultDescription) + sizeof (mBmUefiPrefix)) / sizeof (CHAR16), mBmUefiPrefix);
|
||||
StrCatS (Temp, (StrSize (DefaultDescription) + sizeof (mBmUefiPrefix)) / sizeof (CHAR16), DefaultDescription);
|
||||
FreePool (DefaultDescription);
|
||||
DefaultDescription = Temp;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
@ -44,6 +44,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#include <Protocol/DeferredImageLoad.h>
|
||||
#include <Protocol/PlatformBootManager.h>
|
||||
|
||||
#include <Guid/ImageAuthentication.h>
|
||||
#include <Guid/MemoryTypeInformation.h>
|
||||
#include <Guid/FileInfo.h>
|
||||
#include <Guid/GlobalVariable.h>
|
||||
|
Binary file not shown.
Before Width: | Height: | Size: 12 KiB After Width: | Height: | Size: 403 KiB |
@ -2159,3 +2159,8 @@
|
||||
|
||||
[UserExtensions.TianoCore."ExtraFiles"]
|
||||
MdeModulePkgExtra.uni
|
||||
|
||||
[PcdsFixedAtBuild, PcdsPatchableInModule]
|
||||
## FFS filename to find the default BMP Logo file.
|
||||
# @Prompt FFS Name of Boot Logo File
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdLogoFile |{ 0x99, 0x8b, 0xB2, 0x7B, 0xBB, 0x61, 0xD5, 0x11, 0x9A, 0x5D, 0x00, 0x90, 0x27, 0x3F, 0xC1, 0x4D }|VOID*|0x40000003
|
||||
|
@ -326,7 +326,8 @@ BdsWait (
|
||||
// Can be removed after all keyboard drivers invoke callback in timer callback.
|
||||
|
||||
if (HotkeyTriggered != NULL) {
|
||||
Status = BdsWaitForSingleEvent (HotkeyTriggered, EFI_TIMER_PERIOD_SECONDS (1));
|
||||
//Status = BdsWaitForSingleEvent (HotkeyTriggered, EFI_TIMER_PERIOD_SECONDS (1));
|
||||
Status = BdsWaitForSingleEvent (gST->ConIn->WaitForKey, EFI_TIMER_PERIOD_SECONDS (1));
|
||||
if (!EFI_ERROR (Status)) {
|
||||
break;
|
||||
}
|
||||
@ -1024,7 +1025,7 @@ BdsEntry (
|
||||
//
|
||||
// BdsReadKeys() can be removed after all keyboard drivers invoke callback in timer callback.
|
||||
//
|
||||
BdsReadKeys ();
|
||||
//BdsReadKeys ();
|
||||
|
||||
EfiBootManagerHotkeyBoot ();
|
||||
|
||||
|
@ -499,19 +499,6 @@ GraphicsConsoleControllerDriverStart (
|
||||
}
|
||||
}
|
||||
}
|
||||
if (ModeNumber != Private->GraphicsOutput->Mode->Mode) {
|
||||
//
|
||||
// Current graphics mode is not set or is not set to the mode which we have found,
|
||||
// set the new graphic mode.
|
||||
//
|
||||
Status = Private->GraphicsOutput->SetMode (Private->GraphicsOutput, ModeNumber);
|
||||
if (EFI_ERROR (Status)) {
|
||||
//
|
||||
// The mode set operation failed
|
||||
//
|
||||
goto Error;
|
||||
}
|
||||
}
|
||||
} else if (FeaturePcdGet (PcdUgaConsumeSupport)) {
|
||||
//
|
||||
// At first try to set user-defined resolution
|
||||
@ -780,23 +767,6 @@ CheckModeSupported (
|
||||
&Info
|
||||
);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
if ((Info->HorizontalResolution == HorizontalResolution) &&
|
||||
(Info->VerticalResolution == VerticalResolution)) {
|
||||
if ((GraphicsOutput->Mode->Info->HorizontalResolution == HorizontalResolution) &&
|
||||
(GraphicsOutput->Mode->Info->VerticalResolution == VerticalResolution)) {
|
||||
//
|
||||
// If video device has been set to this mode, we do not need to SetMode again
|
||||
//
|
||||
FreePool (Info);
|
||||
break;
|
||||
} else {
|
||||
Status = GraphicsOutput->SetMode (GraphicsOutput, ModeNumber);
|
||||
if (!EFI_ERROR (Status)) {
|
||||
FreePool (Info);
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
FreePool (Info);
|
||||
}
|
||||
}
|
||||
@ -1922,7 +1892,8 @@ FlushCursor (
|
||||
|
||||
CurrentMode = This->Mode;
|
||||
|
||||
if (!CurrentMode->CursorVisible) {
|
||||
if (!CurrentMode->CursorVisible ||
|
||||
(CurrentMode->CursorColumn == 0 && CurrentMode->CursorRow == 0 )) {
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
@ -6378,7 +6378,11 @@ typedef union {
|
||||
/// [Bit 11] Execute Disable Bit Enable: IA32_EFER.NXE (R/W).
|
||||
///
|
||||
UINT32 NXE:1;
|
||||
UINT32 Reserved3:20;
|
||||
///
|
||||
/// [ Bit 12] Secure Virtual Machine Enable (AMD only)
|
||||
///
|
||||
UINT32 SVME:1;
|
||||
UINT32 Reserved3:19;
|
||||
UINT32 Reserved4:32;
|
||||
} Bits;
|
||||
///
|
||||
|
29
OvmfPkg/Include/Library/Tcg2PhysicalPresencePlatformLib.h
Normal file
29
OvmfPkg/Include/Library/Tcg2PhysicalPresencePlatformLib.h
Normal file
@ -0,0 +1,29 @@
|
||||
/** @file
|
||||
Returns the platform specific Physical Presence configuration.
|
||||
|
||||
Copyright (C) 2020 9elements GmbH
|
||||
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
**/
|
||||
|
||||
#ifndef __TCG2_PHYSICAL_PRESENCE_PLATFORM_LIB_H__
|
||||
#define __TCG2_PHYSICAL_PRESENCE_PLATFORM_LIB_H__
|
||||
|
||||
#include <IndustryStandard/QemuTpm.h>
|
||||
|
||||
/**
|
||||
Reads the platform specific Physical Presence configuration.
|
||||
|
||||
@param[out] The Config structure to read to.
|
||||
@param[out] The PPIinMMIO is True when the PPI is in MMIO memory space
|
||||
|
||||
@retval EFI_SUCCESS Operation completed successfully.
|
||||
@retval EFI_PROTOCOL_ERROR Invalid fw_cfg entry size.
|
||||
**/
|
||||
EFI_STATUS
|
||||
TpmPPIPlatformReadConfig (
|
||||
OUT QEMU_FWCFG_TPM_CONFIG *Config,
|
||||
OUT BOOLEAN *PPIinMMIO
|
||||
);
|
||||
|
||||
#endif
|
@ -27,8 +27,8 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#include <Library/HobLib.h>
|
||||
#include <Library/MemoryAllocationLib.h>
|
||||
#include <Library/PrintLib.h>
|
||||
#include <Library/QemuFwCfgLib.h>
|
||||
#include <Library/Tpm2CommandLib.h>
|
||||
#include <Library/Tcg2PhysicalPresencePlatformLib.h>
|
||||
#include <Library/UefiBootServicesTableLib.h>
|
||||
#include <Library/UefiLib.h>
|
||||
#include <Library/UefiRuntimeServicesTableLib.h>
|
||||
@ -37,46 +37,15 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
#define CONFIRM_BUFFER_SIZE 4096
|
||||
|
||||
/* Wait 3 minutes for user input */
|
||||
#define TIMEOUT (1000 * 1000 * 60 * 3)
|
||||
|
||||
EFI_HII_HANDLE mTcg2PpStringPackHandle;
|
||||
|
||||
#define TPM_PPI_FLAGS (QEMU_TPM_PPI_FUNC_ALLOWED_USR_REQ)
|
||||
|
||||
STATIC volatile QEMU_TPM_PPI *mPpi;
|
||||
|
||||
|
||||
/**
|
||||
Reads QEMU PPI config from fw_cfg.
|
||||
|
||||
@param[out] The Config structure to read to.
|
||||
|
||||
@retval EFI_SUCCESS Operation completed successfully.
|
||||
@retval EFI_PROTOCOL_ERROR Invalid fw_cfg entry size.
|
||||
**/
|
||||
STATIC
|
||||
EFI_STATUS
|
||||
QemuTpmReadConfig (
|
||||
OUT QEMU_FWCFG_TPM_CONFIG *Config
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
FIRMWARE_CONFIG_ITEM FwCfgItem;
|
||||
UINTN FwCfgSize;
|
||||
|
||||
Status = QemuFwCfgFindFile ("etc/tpm/config", &FwCfgItem, &FwCfgSize);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
if (FwCfgSize != sizeof (*Config)) {
|
||||
return EFI_PROTOCOL_ERROR;
|
||||
}
|
||||
|
||||
QemuFwCfgSelectItem (FwCfgItem);
|
||||
QemuFwCfgReadBytes (sizeof (*Config), Config);
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
Initializes QEMU PPI memory region.
|
||||
|
||||
@ -91,6 +60,7 @@ QemuTpmInitPPI (
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
QEMU_FWCFG_TPM_CONFIG Config;
|
||||
BOOLEAN PPIinMMIO;
|
||||
EFI_PHYSICAL_ADDRESS PpiAddress64;
|
||||
EFI_GCD_MEMORY_SPACE_DESCRIPTOR Descriptor;
|
||||
UINTN Idx;
|
||||
@ -99,7 +69,7 @@ QemuTpmInitPPI (
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
Status = QemuTpmReadConfig (&Config);
|
||||
Status = TpmPPIPlatformReadConfig (&Config, &PPIinMMIO);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
@ -123,13 +93,23 @@ QemuTpmInitPPI (
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
goto InvalidPpiAddress;
|
||||
}
|
||||
if (!EFI_ERROR (Status) &&
|
||||
(Descriptor.GcdMemoryType != EfiGcdMemoryTypeMemoryMappedIo &&
|
||||
Descriptor.GcdMemoryType != EfiGcdMemoryTypeNonExistent)) {
|
||||
DEBUG ((DEBUG_ERROR, "[TPM2PP] mPpi has an invalid memory type\n"));
|
||||
goto InvalidPpiAddress;
|
||||
if (PPIinMMIO) {
|
||||
if (!EFI_ERROR (Status) &&
|
||||
(Descriptor.GcdMemoryType != EfiGcdMemoryTypeMemoryMappedIo &&
|
||||
Descriptor.GcdMemoryType != EfiGcdMemoryTypeNonExistent)) {
|
||||
DEBUG ((DEBUG_ERROR, "[TPM2PP] mPpi has an invalid memory type\n"));
|
||||
goto InvalidPpiAddress;
|
||||
}
|
||||
} else {
|
||||
if (!EFI_ERROR (Status) &&
|
||||
(Descriptor.GcdMemoryType != EfiGcdMemoryTypeReserved &&
|
||||
Descriptor.GcdMemoryType != EfiGcdMemoryTypeSystemMemory)) {
|
||||
DEBUG ((DEBUG_ERROR, "[TPM2PP] mPpi has an invalid memory type\n"));
|
||||
goto InvalidPpiAddress;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
for (Idx = 0; Idx < ARRAY_SIZE (mPpi->Func); Idx++) {
|
||||
mPpi->Func[Idx] = 0;
|
||||
}
|
||||
@ -360,12 +340,16 @@ Tcg2ExecutePhysicalPresence (
|
||||
STATIC
|
||||
BOOLEAN
|
||||
Tcg2ReadUserKey (
|
||||
IN BOOLEAN CautionKey
|
||||
IN BOOLEAN CautionKey,
|
||||
IN UINTN Timeout
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
EFI_INPUT_KEY Key;
|
||||
UINT16 InputKey;
|
||||
UINTN Delay;
|
||||
|
||||
Delay = Timeout / 50;
|
||||
|
||||
InputKey = 0;
|
||||
do {
|
||||
@ -382,7 +366,13 @@ Tcg2ReadUserKey (
|
||||
InputKey = Key.ScanCode;
|
||||
}
|
||||
}
|
||||
} while (InputKey == 0);
|
||||
gBS->Stall (50);
|
||||
Delay--;
|
||||
} while (InputKey == 0 && Delay > 0);
|
||||
|
||||
if (Delay == 0) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
if (InputKey != SCAN_ESC) {
|
||||
return TRUE;
|
||||
@ -638,7 +628,7 @@ Tcg2UserConfirm (
|
||||
FreePool (ConfirmText);
|
||||
HiiRemovePackages (mTcg2PpStringPackHandle);
|
||||
|
||||
if (Tcg2ReadUserKey (CautionKey)) {
|
||||
if (Tcg2ReadUserKey (CautionKey, TIMEOUT)) {
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
|
@ -57,11 +57,11 @@
|
||||
HobLib
|
||||
MemoryAllocationLib
|
||||
PrintLib
|
||||
QemuFwCfgLib
|
||||
Tpm2CommandLib
|
||||
UefiBootServicesTableLib
|
||||
UefiLib
|
||||
UefiRuntimeServicesTableLib
|
||||
Tcg2PhysicalPresencePlatformLib
|
||||
|
||||
[Protocols]
|
||||
gEfiTcg2ProtocolGuid ## SOMETIMES_CONSUMES
|
||||
|
@ -0,0 +1,56 @@
|
||||
/** @file
|
||||
Returns the platform specific configuration for the QEMU PPI.
|
||||
|
||||
Caution: This module requires additional review when modified.
|
||||
This driver will have external input - variable.
|
||||
This external input must be validated carefully to avoid security issue.
|
||||
|
||||
Copyright (C) 2018, Red Hat, Inc.
|
||||
Copyright (c) 2018, IBM Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2013 - 2016, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
||||
#include <PiDxe.h>
|
||||
|
||||
#include <IndustryStandard/QemuTpm.h>
|
||||
|
||||
#include <Library/QemuFwCfgLib.h>
|
||||
#include <Library/Tcg2PhysicalPresencePlatformLib.h>
|
||||
|
||||
/**
|
||||
Reads QEMU PPI config from fw_cfg.
|
||||
|
||||
@param[out] The Config structure to read to.
|
||||
@param[out] The PPIinMMIO is True when the PPI is in MMIO memory space
|
||||
|
||||
@retval EFI_SUCCESS Operation completed successfully.
|
||||
@retval EFI_PROTOCOL_ERROR Invalid fw_cfg entry size.
|
||||
**/
|
||||
EFI_STATUS
|
||||
TpmPPIPlatformReadConfig (
|
||||
OUT QEMU_FWCFG_TPM_CONFIG *Config,
|
||||
OUT BOOLEAN *PPIinMMIO
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
FIRMWARE_CONFIG_ITEM FwCfgItem;
|
||||
UINTN FwCfgSize;
|
||||
|
||||
Status = QemuFwCfgFindFile ("etc/tpm/config", &FwCfgItem, &FwCfgSize);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
if (FwCfgSize != sizeof (*Config)) {
|
||||
return EFI_PROTOCOL_ERROR;
|
||||
}
|
||||
|
||||
QemuFwCfgSelectItem (FwCfgItem);
|
||||
QemuFwCfgReadBytes (sizeof (*Config), Config);
|
||||
|
||||
*PPIinMMIO = TRUE;
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
@ -0,0 +1,36 @@
|
||||
## @file
|
||||
# Returns the platform specific configuration for the QEMU PPI.
|
||||
#
|
||||
# Caution: This module requires additional review when modified.
|
||||
# This driver will have external input - variable.
|
||||
# This external input must be validated carefully to avoid security issue.
|
||||
#
|
||||
# Copyright (C) 2018, Red Hat, Inc.
|
||||
# Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#
|
||||
##
|
||||
|
||||
[Defines]
|
||||
INF_VERSION = 0x00010005
|
||||
BASE_NAME = Tcg2PhysicalPresencePlatformLibQemu
|
||||
FILE_GUID = 9336E7F0-6CA1-4E6D-A0E9-DFE5F077AA02
|
||||
MODULE_TYPE = DXE_DRIVER
|
||||
VERSION_STRING = 1.0
|
||||
LIBRARY_CLASS = Tcg2PhysicalPresencePlatformLib|DXE_DRIVER DXE_RUNTIME_DRIVER UEFI_APPLICATION UEFI_DRIVER
|
||||
|
||||
#
|
||||
# The following information is for reference only and not required by the build tools.
|
||||
#
|
||||
# VALID_ARCHITECTURES = IA32 X64 EBC
|
||||
#
|
||||
|
||||
[Sources]
|
||||
DxeTcg2PhysicalPresencePlatformLib.c
|
||||
|
||||
[Packages]
|
||||
OvmfPkg/OvmfPkg.dec
|
||||
MdePkg/MdePkg.dec
|
||||
|
||||
[LibraryClasses]
|
||||
QemuFwCfgLib
|
@ -233,6 +233,7 @@
|
||||
Tpm12CommandLib|SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
|
||||
Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
|
||||
Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibQemu/DxeTcg2PhysicalPresenceLib.inf
|
||||
Tcg2PhysicalPresencePlatformLib|OvmfPkg/Library/Tcg2PhysicalPresencePlatformLibQemu/DxeTcg2PhysicalPresencePlatformLib.inf
|
||||
Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
|
||||
TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
|
||||
!else
|
||||
|
@ -237,6 +237,7 @@
|
||||
Tpm12CommandLib|SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
|
||||
Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
|
||||
Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibQemu/DxeTcg2PhysicalPresenceLib.inf
|
||||
Tcg2PhysicalPresencePlatformLib|OvmfPkg/Library/Tcg2PhysicalPresencePlatformLibQemu/DxeTcg2PhysicalPresencePlatformLib.inf
|
||||
Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
|
||||
TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
|
||||
!else
|
||||
|
@ -237,6 +237,7 @@
|
||||
Tpm12CommandLib|SecurityPkg/Library/Tpm12CommandLib/Tpm12CommandLib.inf
|
||||
Tpm2CommandLib|SecurityPkg/Library/Tpm2CommandLib/Tpm2CommandLib.inf
|
||||
Tcg2PhysicalPresenceLib|OvmfPkg/Library/Tcg2PhysicalPresenceLibQemu/DxeTcg2PhysicalPresenceLib.inf
|
||||
Tcg2PhysicalPresencePlatformLib|OvmfPkg/Library/Tcg2PhysicalPresencePlatformLibQemu/DxeTcg2PhysicalPresencePlatformLib.inf
|
||||
Tcg2PpVendorLib|SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf
|
||||
TpmMeasurementLib|SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.inf
|
||||
!else
|
||||
|
@ -19,6 +19,7 @@
|
||||
#include <Library/UefiRuntimeServicesTableLib.h>
|
||||
#include <Library/SecureBootVariableLib.h>
|
||||
#include <Library/SecureBootVariableProvisionLib.h>
|
||||
#include <Library/DxeServicesLib.h>
|
||||
|
||||
/**
|
||||
Enroll a key/certificate based on a default variable.
|
||||
@ -111,6 +112,7 @@ SecureBootInitPKDefault (
|
||||
}
|
||||
|
||||
if (EFI_ERROR (Status) && (Status != EFI_NOT_FOUND)) {
|
||||
DEBUG ((DEBUG_INFO, "Variable %s read error.\n", EFI_PK_DEFAULT_VARIABLE_NAME));
|
||||
return Status;
|
||||
}
|
||||
|
||||
@ -259,10 +261,10 @@ SecureBootInitDbxDefault (
|
||||
IN VOID
|
||||
)
|
||||
{
|
||||
EFI_SIGNATURE_LIST *EfiSig;
|
||||
UINTN SigListsSize;
|
||||
UINTN Size;
|
||||
EFI_STATUS Status;
|
||||
UINT8 *Data;
|
||||
VOID *Buffer;
|
||||
UINTN DataSize;
|
||||
|
||||
//
|
||||
@ -284,7 +286,13 @@ SecureBootInitDbxDefault (
|
||||
//
|
||||
DEBUG ((DEBUG_INFO, "Variable %s does not exist.\n", EFI_DBX_DEFAULT_VARIABLE_NAME));
|
||||
|
||||
Status = SecureBootFetchData (&gDefaultdbxFileGuid, &SigListsSize, &EfiSig);
|
||||
Status = GetSectionFromAnyFv (
|
||||
&gDefaultdbxFileGuid,
|
||||
EFI_SECTION_RAW,
|
||||
0,
|
||||
&Buffer,
|
||||
&Size
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_INFO, "Content for %s not found\n", EFI_DBX_DEFAULT_VARIABLE_NAME));
|
||||
return Status;
|
||||
@ -294,15 +302,13 @@ SecureBootInitDbxDefault (
|
||||
EFI_DBX_DEFAULT_VARIABLE_NAME,
|
||||
&gEfiGlobalVariableGuid,
|
||||
EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS,
|
||||
SigListsSize,
|
||||
(VOID *)EfiSig
|
||||
Size,
|
||||
(VOID *)Buffer
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_INFO, "Failed to set %s\n", EFI_DBX_DEFAULT_VARIABLE_NAME));
|
||||
}
|
||||
|
||||
FreePool (EfiSig);
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
@ -2740,6 +2740,15 @@ DriverEntry (
|
||||
DEBUG ((EFI_D_INFO, "Tcg2.NumberOfPCRBanks - 0x%08x\n", mTcgDxeData.BsCap.NumberOfPCRBanks));
|
||||
DEBUG ((EFI_D_INFO, "Tcg2.ActivePcrBanks - 0x%08x\n", mTcgDxeData.BsCap.ActivePcrBanks));
|
||||
|
||||
// HACK: This is usually done in Tcg2Pei
|
||||
UINT32 Tpm2PcrMask;
|
||||
Tpm2PcrMask = PcdGet32 (PcdTpm2HashMask);
|
||||
if (Tpm2PcrMask != mTcgDxeData.BsCap.HashAlgorithmBitmap) {
|
||||
Tpm2PcrMask &= mTcgDxeData.BsCap.HashAlgorithmBitmap;
|
||||
Status = PcdSet32S (PcdTpm2HashMask, Tpm2PcrMask);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
}
|
||||
|
||||
if (mTcgDxeData.BsCap.TPMPresentFlag) {
|
||||
//
|
||||
// Setup the log area and copy event log from hob list to it
|
||||
|
@ -107,6 +107,7 @@
|
||||
gEfiSecurityPkgTokenSpaceGuid.PcdTpm2AcpiTableLaml ## PRODUCES
|
||||
gEfiSecurityPkgTokenSpaceGuid.PcdTpm2AcpiTableLasa ## PRODUCES
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdTcgPfpMeasurementRevision ## CONSUMES
|
||||
gEfiSecurityPkgTokenSpaceGuid.PcdTpm2HashMask ## PRODUCES
|
||||
|
||||
[Depex]
|
||||
# According to PcdTpm2AcpiTableRev definition in SecurityPkg.dec
|
||||
|
@ -1,611 +1,132 @@
|
||||
/** @file
|
||||
VFR file used by the SecureBoot configuration component.
|
||||
|
||||
Copyright (c) 2011 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
// SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
// SPDX-FileCopyrightText: Copyright (c) 2011 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
// SPDX-FileCopyrightText: 2023 System76 <info@system76.com>
|
||||
|
||||
#include "SecureBootConfigNvData.h"
|
||||
|
||||
formset
|
||||
guid = SECUREBOOT_CONFIG_FORM_SET_GUID,
|
||||
title = STRING_TOKEN(STR_SECUREBOOT_TITLE),
|
||||
help = STRING_TOKEN(STR_SECUREBOOT_HELP),
|
||||
guid = SECUREBOOT_CONFIG_FORM_SET_GUID,
|
||||
title = STRING_TOKEN(STR_SECUREBOOT_TITLE),
|
||||
help = STRING_TOKEN(STR_SECUREBOOT_HELP),
|
||||
classguid = EFI_HII_PLATFORM_SETUP_FORMSET_GUID,
|
||||
|
||||
varstore SECUREBOOT_CONFIGURATION,
|
||||
varid = SECUREBOOT_CONFIGURATION_VARSTORE_ID,
|
||||
name = SECUREBOOT_CONFIGURATION,
|
||||
guid = SECUREBOOT_CONFIG_FORM_SET_GUID;
|
||||
name = SECUREBOOT_CONFIGURATION,
|
||||
guid = SECUREBOOT_CONFIG_FORM_SET_GUID;
|
||||
|
||||
//
|
||||
// ##1 Form "Secure Boot Configuration"
|
||||
//
|
||||
form formid = SECUREBOOT_CONFIGURATION_FORM_ID,
|
||||
title = STRING_TOKEN(STR_SECUREBOOT_TITLE);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
// FIXME: firmware-setup doesn't handle EFI_IFR_TEXT.
|
||||
//text
|
||||
// help = STRING_TOKEN(STR_SECURE_BOOT_STATE_HELP),
|
||||
// text = STRING_TOKEN(STR_SECURE_BOOT_STATE_PROMPT),
|
||||
// text = STRING_TOKEN(STR_SECURE_BOOT_STATE_CONTENT);
|
||||
|
||||
text
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_STATE_HELP),
|
||||
text = STRING_TOKEN(STR_SECURE_BOOT_STATE_PROMPT),
|
||||
text = STRING_TOKEN(STR_SECURE_BOOT_STATE_CONTENT);
|
||||
subtitle text = STRING_TOKEN(STR_SECURE_BOOT_STATE_PROMPT);
|
||||
|
||||
//
|
||||
// Display of Check Box: Attempt Secure Boot
|
||||
//
|
||||
grayoutif ideqval SECUREBOOT_CONFIGURATION.HideSecureBoot == 1 OR NOT ideqval SECUREBOOT_CONFIGURATION.PhysicalPresent == 1;
|
||||
checkbox varid = SECUREBOOT_CONFIGURATION.AttemptSecureBoot,
|
||||
questionid = KEY_SECURE_BOOT_ENABLE,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_PROMPT),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_HELP),
|
||||
flags = INTERACTIVE | RESET_REQUIRED,
|
||||
endcheckbox;
|
||||
endif;
|
||||
|
||||
//
|
||||
// Display of Oneof: 'Secure Boot Mode'
|
||||
//
|
||||
// XXX: Needed for "Secure Boot status" string to update.
|
||||
suppressif TRUE;
|
||||
oneof name = SecureBootMode,
|
||||
questionid = KEY_SECURE_BOOT_MODE,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_MODE_PROMPT),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_MODE_HELP),
|
||||
flags = INTERACTIVE | NUMERIC_SIZE_1,
|
||||
option text = STRING_TOKEN(STR_STANDARD_MODE), value = SECURE_BOOT_MODE_STANDARD, flags = DEFAULT;
|
||||
option text = STRING_TOKEN(STR_CUSTOM_MODE), value = SECURE_BOOT_MODE_CUSTOM, flags = 0;
|
||||
questionid = KEY_SECURE_BOOT_MODE,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_MODE_PROMPT),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_MODE_HELP),
|
||||
flags = INTERACTIVE | NUMERIC_SIZE_1,
|
||||
option text = STRING_TOKEN(STR_STANDARD_MODE), value = SECURE_BOOT_MODE_STANDARD, flags = DEFAULT;
|
||||
option text = STRING_TOKEN(STR_CUSTOM_MODE), value = SECURE_BOOT_MODE_CUSTOM, flags = 0;
|
||||
endoneof;
|
||||
endif;
|
||||
|
||||
//
|
||||
// Display of 'Current Secure Boot Mode'
|
||||
//
|
||||
suppressif questionref(SecureBootMode) == SECURE_BOOT_MODE_STANDARD;
|
||||
grayoutif NOT ideqval SECUREBOOT_CONFIGURATION.PhysicalPresent == 1;
|
||||
goto FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_OPTION),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_OPTION_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_OPTION;
|
||||
suppressif ideqval SECUREBOOT_CONFIGURATION.AttemptSecureBoot == 0;
|
||||
goto FORMID_SECURE_BOOT_DISABLE,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_DISABLE_PROMPT),
|
||||
help = STRING_TOKEN(STR_NULL);
|
||||
endif;
|
||||
suppressif ideqval SECUREBOOT_CONFIGURATION.AttemptSecureBoot == 1;
|
||||
goto FORMID_SECURE_BOOT_ENABLE,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_ENABLE_PROMPT),
|
||||
help = STRING_TOKEN(STR_NULL);
|
||||
endif;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_DELETE_KEYS,
|
||||
prompt = STRING_TOKEN(STR_DELETE_KEYS_PROMPT),
|
||||
help = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_RESTORE_KEYS,
|
||||
prompt = STRING_TOKEN(STR_RESTORE_KEYS_PROMPT),
|
||||
help = STRING_TOKEN(STR_NULL);
|
||||
|
||||
endform;
|
||||
|
||||
form formid = FORMID_SECURE_BOOT_ENABLE,
|
||||
title = STRING_TOKEN(STR_SECUREBOOT_TITLE);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_ENABLE_NOTICE);
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
text
|
||||
help = STRING_TOKEN(STR_SECURE_RESET_TO_DEFAULTS_HELP),
|
||||
text = STRING_TOKEN(STR_SECURE_RESET_TO_DEFAULTS),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_RESET_TO_DEFAULT;
|
||||
help = STRING_TOKEN(STR_NULL),
|
||||
text = STRING_TOKEN(STR_ENABLE_SELECTION),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_STATE_ENABLE;
|
||||
|
||||
goto SECUREBOOT_CONFIGURATION_FORM_ID,
|
||||
prompt = STRING_TOKEN(STR_CANCEL),
|
||||
help = STRING_TOKEN(STR_NULL);
|
||||
endform;
|
||||
|
||||
//
|
||||
// ##2 Form: 'Custom Secure Boot Options'
|
||||
//
|
||||
form formid = FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_OPTION_TITLE);
|
||||
form formid = FORMID_SECURE_BOOT_DISABLE,
|
||||
title = STRING_TOKEN(STR_SECUREBOOT_TITLE);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_DISABLE_NOTICE);
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_SECURE_BOOT_PK_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_PK_OPTION),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_PK_OPTION_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_PK_OPTION;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_SECURE_BOOT_KEK_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_KEK_OPTION),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_KEK_OPTION_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_KEK_OPTION;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_SECURE_BOOT_DB_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_DB_OPTION),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_DB_OPTION_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_DB_OPTION;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_SECURE_BOOT_DBX_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_DBX_OPTION),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_DBX_OPTION_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_DBX_OPTION;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_SECURE_BOOT_DBT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_DBT_OPTION),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_DBT_OPTION_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_DBT_OPTION;
|
||||
text
|
||||
help = STRING_TOKEN(STR_NULL),
|
||||
text = STRING_TOKEN(STR_DISABLE_SELECTION),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_STATE_DISABLE;
|
||||
|
||||
goto SECUREBOOT_CONFIGURATION_FORM_ID,
|
||||
prompt = STRING_TOKEN(STR_CANCEL),
|
||||
help = STRING_TOKEN(STR_NULL);
|
||||
endform;
|
||||
|
||||
//
|
||||
// ##3 Form: 'PK Options'
|
||||
//
|
||||
form formid = FORMID_SECURE_BOOT_PK_OPTION_FORM,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_PK_OPTION);
|
||||
form formid = FORMID_DELETE_KEYS,
|
||||
title = STRING_TOKEN(STR_SECUREBOOT_TITLE);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_DELETE_KEYS_NOTICE);
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
//
|
||||
// Display of 'Enroll PK'
|
||||
//
|
||||
grayoutif ideqval SECUREBOOT_CONFIGURATION.HasPk == 1;
|
||||
goto FORMID_ENROLL_PK_FORM,
|
||||
prompt = STRING_TOKEN(STR_ENROLL_PK),
|
||||
help = STRING_TOKEN(STR_ENROLL_PK_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_ENROLL_PK;
|
||||
endif;
|
||||
text
|
||||
help = STRING_TOKEN(STR_NULL),
|
||||
text = STRING_TOKEN(STR_DELETE_KEYS_SELECTION),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_DELETE_PK;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
//
|
||||
// Display of Check Box: 'Delete Pk'
|
||||
//
|
||||
grayoutif ideqval SECUREBOOT_CONFIGURATION.HideSecureBoot == 1;
|
||||
checkbox varid = SECUREBOOT_CONFIGURATION.DeletePk,
|
||||
questionid = KEY_SECURE_BOOT_DELETE_PK,
|
||||
prompt = STRING_TOKEN(STR_DELETE_PK),
|
||||
help = STRING_TOKEN(STR_DELETE_PK_HELP),
|
||||
flags = INTERACTIVE | RESET_REQUIRED,
|
||||
endcheckbox;
|
||||
endif;
|
||||
goto SECUREBOOT_CONFIGURATION_FORM_ID,
|
||||
prompt = STRING_TOKEN(STR_CANCEL),
|
||||
help = STRING_TOKEN(STR_NULL);
|
||||
endform;
|
||||
|
||||
//
|
||||
// ##4 Form: 'Enroll PK'
|
||||
//
|
||||
form formid = FORMID_ENROLL_PK_FORM,
|
||||
title = STRING_TOKEN(STR_ENROLL_PK);
|
||||
form formid = FORMID_RESTORE_KEYS,
|
||||
title = STRING_TOKEN(STR_SECUREBOOT_TITLE);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_RESTORE_KEYS_NOTICE);
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_ENROLL_PK_FORM,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_ENROLL_PK_FILE),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_ENROLL_PK_FILE),
|
||||
flags = INTERACTIVE,
|
||||
key = FORMID_ENROLL_PK_FORM;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
label FORMID_ENROLL_PK_FORM;
|
||||
label LABEL_END;
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_SAVE_AND_EXIT),
|
||||
help = STRING_TOKEN(STR_SAVE_AND_EXIT),
|
||||
flags = INTERACTIVE| RESET_REQUIRED,
|
||||
key = KEY_VALUE_SAVE_AND_EXIT_PK;
|
||||
|
||||
goto FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_NO_SAVE_AND_EXIT),
|
||||
help = STRING_TOKEN(STR_NO_SAVE_AND_EXIT),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_NO_SAVE_AND_EXIT_PK;
|
||||
|
||||
endform;
|
||||
|
||||
//
|
||||
// ##5 Form: 'KEK Options'
|
||||
//
|
||||
form formid = FORMID_SECURE_BOOT_KEK_OPTION_FORM,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_KEK_OPTION);
|
||||
|
||||
//
|
||||
// Display of 'Enroll KEK'
|
||||
//
|
||||
goto FORMID_ENROLL_KEK_FORM,
|
||||
prompt = STRING_TOKEN(STR_ENROLL_KEK),
|
||||
help = STRING_TOKEN(STR_ENROLL_KEK_HELP),
|
||||
flags = INTERACTIVE;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
//
|
||||
// Display of 'Delete KEK'
|
||||
//
|
||||
goto FORMID_DELETE_KEK_FORM,
|
||||
prompt = STRING_TOKEN(STR_DELETE_KEK),
|
||||
help = STRING_TOKEN(STR_DELETE_KEK_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_DELETE_KEK;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
endform;
|
||||
|
||||
//
|
||||
// ##6 Form: 'Enroll KEK'
|
||||
//
|
||||
form formid = FORMID_ENROLL_KEK_FORM,
|
||||
title = STRING_TOKEN(STR_ENROLL_KEK_TITLE);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_ENROLL_KEK_FORM,
|
||||
prompt = STRING_TOKEN(STR_FORM_ENROLL_KEK_FROM_FILE_TITLE),
|
||||
help = STRING_TOKEN(STR_FORM_ENROLL_KEK_FROM_FILE_TITLE_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = FORMID_ENROLL_KEK_FORM;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
label FORMID_ENROLL_KEK_FORM;
|
||||
label LABEL_END;
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
string varid = SECUREBOOT_CONFIGURATION.SignatureGuid,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_SIGNATURE_GUID),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_SIGNATURE_GUID_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_KEK_GUID,
|
||||
minsize = SECURE_BOOT_GUID_SIZE,
|
||||
maxsize = SECURE_BOOT_GUID_SIZE,
|
||||
endstring;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_SAVE_AND_EXIT),
|
||||
help = STRING_TOKEN(STR_SAVE_AND_EXIT),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_SAVE_AND_EXIT_KEK;
|
||||
|
||||
goto FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_NO_SAVE_AND_EXIT),
|
||||
help = STRING_TOKEN(STR_NO_SAVE_AND_EXIT),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_NO_SAVE_AND_EXIT_KEK;
|
||||
|
||||
endform;
|
||||
|
||||
//
|
||||
// ##7 Form: 'Delete KEK'
|
||||
//
|
||||
form formid = FORMID_DELETE_KEK_FORM,
|
||||
title = STRING_TOKEN(STR_DELETE_KEK_TITLE);
|
||||
|
||||
label LABEL_KEK_DELETE;
|
||||
label LABEL_END;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
endform;
|
||||
|
||||
//
|
||||
// ##8 Form: 'DB Options'
|
||||
//
|
||||
form formid = FORMID_SECURE_BOOT_DB_OPTION_FORM,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_DB_OPTION);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto SECUREBOOT_ENROLL_SIGNATURE_TO_DB,
|
||||
prompt = STRING_TOKEN (STR_SECURE_BOOT_ENROLL_SIGNATURE),
|
||||
help = STRING_TOKEN (STR_SECURE_BOOT_ENROLL_SIGNATURE),
|
||||
flags = 0;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto SECUREBOOT_DELETE_SIGNATURE_FROM_DB,
|
||||
prompt = STRING_TOKEN (STR_SECURE_BOOT_DELETE_SIGNATURE),
|
||||
help = STRING_TOKEN (STR_SECURE_BOOT_DELETE_SIGNATURE),
|
||||
flags = INTERACTIVE,
|
||||
key = SECUREBOOT_DELETE_SIGNATURE_FROM_DB;
|
||||
|
||||
endform;
|
||||
|
||||
//
|
||||
// ##9 Form: 'DBX Options'
|
||||
//
|
||||
form formid = FORMID_SECURE_BOOT_DBX_OPTION_FORM,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_DBX_OPTION);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto SECUREBOOT_ENROLL_SIGNATURE_TO_DBX,
|
||||
prompt = STRING_TOKEN (STR_SECURE_BOOT_ENROLL_SIGNATURE),
|
||||
help = STRING_TOKEN (STR_SECURE_BOOT_ENROLL_SIGNATURE),
|
||||
flags = 0;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto SECUREBOOT_DELETE_SIGNATURE_LIST_FORM,
|
||||
prompt = STRING_TOKEN (STR_SECURE_BOOT_DELETE_SIGNATURE),
|
||||
help = STRING_TOKEN (STR_SECURE_BOOT_DELETE_SIGNATURE),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_FROM_DBX_TO_LIST_FORM;
|
||||
|
||||
endform;
|
||||
|
||||
//
|
||||
// ##9 Form: 'DBT Options'
|
||||
//
|
||||
form formid = FORMID_SECURE_BOOT_DBT_OPTION_FORM,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_DBT_OPTION);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto SECUREBOOT_ENROLL_SIGNATURE_TO_DBT,
|
||||
prompt = STRING_TOKEN (STR_SECURE_BOOT_ENROLL_SIGNATURE),
|
||||
help = STRING_TOKEN (STR_SECURE_BOOT_ENROLL_SIGNATURE),
|
||||
flags = 0;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto SECUREBOOT_DELETE_SIGNATURE_FROM_DBT,
|
||||
prompt = STRING_TOKEN (STR_SECURE_BOOT_DELETE_SIGNATURE),
|
||||
help = STRING_TOKEN (STR_SECURE_BOOT_DELETE_SIGNATURE),
|
||||
flags = INTERACTIVE,
|
||||
key = SECUREBOOT_DELETE_SIGNATURE_FROM_DBT;
|
||||
|
||||
endform;
|
||||
|
||||
//
|
||||
// Form: 'Delete Signature' for DB Options.
|
||||
//
|
||||
form formid = SECUREBOOT_DELETE_SIGNATURE_FROM_DB,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_DELETE_SIGNATURE);
|
||||
|
||||
label LABEL_DB_DELETE;
|
||||
label LABEL_END;
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
endform;
|
||||
|
||||
//
|
||||
// Form: Display Signature List.
|
||||
//
|
||||
form formid = SECUREBOOT_DELETE_SIGNATURE_LIST_FORM,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_DELETE_LIST_FORM);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
grayoutif ideqval SECUREBOOT_CONFIGURATION.ListCount == 0;
|
||||
label LABEL_DELETE_ALL_LIST_BUTTON;
|
||||
//
|
||||
// Will create a goto button dynamically here.
|
||||
//
|
||||
label LABEL_END;
|
||||
endif;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
label LABEL_SIGNATURE_LIST_START;
|
||||
label LABEL_END;
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
endform;
|
||||
|
||||
//
|
||||
// Form: Display Signature Data.
|
||||
//
|
||||
form formid = SECUREBOOT_DELETE_SIGNATURE_DATA_FORM,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_DELETE_DATA_FORM);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto SECUREBOOT_DELETE_SIGNATURE_LIST_FORM,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_DELETE_ALL_DATA),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_DELETE_ALL_DATA_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_DELETE_ALL_DATA;
|
||||
|
||||
grayoutif ideqval SECUREBOOT_CONFIGURATION.CheckedDataCount == 0;
|
||||
goto SECUREBOOT_DELETE_SIGNATURE_LIST_FORM,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_DELETE_CHECK_DATA),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_DELETE_CHECK_DATA_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_DELETE_CHECK_DATA;
|
||||
endif;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
label LABEL_SIGNATURE_DATA_START;
|
||||
label LABEL_END;
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
endform;
|
||||
|
||||
|
||||
//
|
||||
// Form: 'Delete Signature' for DBT Options.
|
||||
//
|
||||
form formid = SECUREBOOT_DELETE_SIGNATURE_FROM_DBT,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_DELETE_SIGNATURE);
|
||||
|
||||
label LABEL_DBT_DELETE;
|
||||
label LABEL_END;
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
endform;
|
||||
|
||||
//
|
||||
// Form: 'Enroll Signature' for DB options.
|
||||
//
|
||||
form formid = SECUREBOOT_ENROLL_SIGNATURE_TO_DB,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_ENROLL_SIGNATURE);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto SECUREBOOT_ENROLL_SIGNATURE_TO_DB,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_ADD_SIGNATURE_FILE),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_ADD_SIGNATURE_FILE),
|
||||
flags = INTERACTIVE,
|
||||
key = SECUREBOOT_ENROLL_SIGNATURE_TO_DB;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
label SECUREBOOT_ENROLL_SIGNATURE_TO_DB;
|
||||
label LABEL_END;
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
string varid = SECUREBOOT_CONFIGURATION.SignatureGuid,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_SIGNATURE_GUID),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_SIGNATURE_GUID_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_SIGNATURE_GUID_DB,
|
||||
minsize = SECURE_BOOT_GUID_SIZE,
|
||||
maxsize = SECURE_BOOT_GUID_SIZE,
|
||||
endstring;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_SAVE_AND_EXIT),
|
||||
help = STRING_TOKEN(STR_SAVE_AND_EXIT),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_SAVE_AND_EXIT_DB;
|
||||
|
||||
goto FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_NO_SAVE_AND_EXIT),
|
||||
help = STRING_TOKEN(STR_NO_SAVE_AND_EXIT),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_NO_SAVE_AND_EXIT_DB;
|
||||
|
||||
endform;
|
||||
|
||||
//
|
||||
// Form: 'Enroll Signature' for DBX options.
|
||||
//
|
||||
form formid = SECUREBOOT_ENROLL_SIGNATURE_TO_DBX,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_ENROLL_SIGNATURE);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto SECUREBOOT_ENROLL_SIGNATURE_TO_DBX,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_ADD_SIGNATURE_FILE),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_ADD_SIGNATURE_FILE),
|
||||
flags = INTERACTIVE,
|
||||
key = SECUREBOOT_ENROLL_SIGNATURE_TO_DBX;
|
||||
|
||||
label SECUREBOOT_ENROLL_SIGNATURE_TO_DBX;
|
||||
label LABEL_END;
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
grayoutif ideqval SECUREBOOT_CONFIGURATION.FileEnrollType == 3;
|
||||
string varid = SECUREBOOT_CONFIGURATION.SignatureGuid,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_SIGNATURE_GUID),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_SIGNATURE_GUID_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_SIGNATURE_GUID_DBX,
|
||||
minsize = SECURE_BOOT_GUID_SIZE,
|
||||
maxsize = SECURE_BOOT_GUID_SIZE,
|
||||
endstring;
|
||||
endif;
|
||||
|
||||
disableif NOT ideqval SECUREBOOT_CONFIGURATION.FileEnrollType == 1;
|
||||
oneof name = X509SignatureFormatInDbx,
|
||||
varid = SECUREBOOT_CONFIGURATION.CertificateFormat,
|
||||
prompt = STRING_TOKEN(STR_DBX_CERTIFICATE_FORMAT_PROMPT),
|
||||
help = STRING_TOKEN(STR_DBX_CERTIFICATE_FORMAT_HELP),
|
||||
option text = STRING_TOKEN(STR_DBX_CERTIFICATE_FORMAT_SHA256), value = 0x1, flags = DEFAULT;
|
||||
option text = STRING_TOKEN(STR_DBX_CERTIFICATE_FORMAT_SHA384), value = 0x2, flags = 0;
|
||||
option text = STRING_TOKEN(STR_DBX_CERTIFICATE_FORMAT_SHA512), value = 0x3, flags = 0;
|
||||
option text = STRING_TOKEN(STR_DBX_CERTIFICATE_FORMAT_RAW), value = 0x4, flags = 0;
|
||||
endoneof;
|
||||
endif;
|
||||
|
||||
disableif NOT ideqval SECUREBOOT_CONFIGURATION.FileEnrollType == 2;
|
||||
text
|
||||
help = STRING_TOKEN(STR_DBX_PE_IMAGE_FORMAT_HELP), // Help string
|
||||
text = STRING_TOKEN(STR_DBX_CERTIFICATE_FORMAT_PROMPT), // Prompt string
|
||||
text = STRING_TOKEN(STR_DBX_PE_FORMAT_SHA256); // PE image type
|
||||
endif;
|
||||
|
||||
disableif NOT ideqval SECUREBOOT_CONFIGURATION.FileEnrollType == 3;
|
||||
text
|
||||
help = STRING_TOKEN(STR_DBX_AUTH_2_FORMAT_HELP), // Help string
|
||||
text = STRING_TOKEN(STR_DBX_CERTIFICATE_FORMAT_PROMPT), // Prompt string
|
||||
text = STRING_TOKEN(STR_DBX_AUTH_2_FORMAT); // AUTH_2 image type
|
||||
endif;
|
||||
|
||||
suppressif ideqval SECUREBOOT_CONFIGURATION.CertificateFormat == 4;
|
||||
checkbox varid = SECUREBOOT_CONFIGURATION.AlwaysRevocation,
|
||||
prompt = STRING_TOKEN(STR_ALWAYS_CERTIFICATE_REVOCATION_PROMPT),
|
||||
help = STRING_TOKEN(STR_ALWAYS_CERTIFICATE_REVOCATION_HELP),
|
||||
flags = INTERACTIVE,
|
||||
endcheckbox;
|
||||
|
||||
suppressif ideqval SECUREBOOT_CONFIGURATION.AlwaysRevocation == 1;
|
||||
date varid = SECUREBOOT_CONFIGURATION.RevocationDate,
|
||||
prompt = STRING_TOKEN(STR_CERTIFICATE_REVOCATION_DATE_PROMPT),
|
||||
help = STRING_TOKEN(STR_CERTIFICATE_REVOCATION_DATE_HELP),
|
||||
flags = STORAGE_NORMAL,
|
||||
enddate;
|
||||
|
||||
time varid = SECUREBOOT_CONFIGURATION.RevocationTime,
|
||||
prompt = STRING_TOKEN(STR_CERTIFICATE_REVOCATION_TIME_PROMPT),
|
||||
help = STRING_TOKEN(STR_CERTIFICATE_REVOCATION_TIME_HELP),
|
||||
flags = STORAGE_NORMAL,
|
||||
endtime;
|
||||
endif;
|
||||
endif;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_SAVE_AND_EXIT),
|
||||
help = STRING_TOKEN(STR_SAVE_AND_EXIT),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_SAVE_AND_EXIT_DBX;
|
||||
|
||||
goto FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_NO_SAVE_AND_EXIT),
|
||||
help = STRING_TOKEN(STR_NO_SAVE_AND_EXIT),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_NO_SAVE_AND_EXIT_DBX;
|
||||
|
||||
endform;
|
||||
|
||||
//
|
||||
// Form: 'Enroll Signature' for DBT options.
|
||||
//
|
||||
form formid = SECUREBOOT_ENROLL_SIGNATURE_TO_DBT,
|
||||
title = STRING_TOKEN(STR_SECURE_BOOT_ENROLL_SIGNATURE);
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto SECUREBOOT_ENROLL_SIGNATURE_TO_DBT,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_ADD_SIGNATURE_FILE),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_ADD_SIGNATURE_FILE),
|
||||
flags = INTERACTIVE,
|
||||
key = SECUREBOOT_ENROLL_SIGNATURE_TO_DBT;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
label SECUREBOOT_ENROLL_SIGNATURE_TO_DBT;
|
||||
label LABEL_END;
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
string varid = SECUREBOOT_CONFIGURATION.SignatureGuid,
|
||||
prompt = STRING_TOKEN(STR_SECURE_BOOT_SIGNATURE_GUID),
|
||||
help = STRING_TOKEN(STR_SECURE_BOOT_SIGNATURE_GUID_HELP),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_SECURE_BOOT_SIGNATURE_GUID_DBT,
|
||||
minsize = SECURE_BOOT_GUID_SIZE,
|
||||
maxsize = SECURE_BOOT_GUID_SIZE,
|
||||
endstring;
|
||||
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
subtitle text = STRING_TOKEN(STR_NULL);
|
||||
|
||||
goto FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_SAVE_AND_EXIT),
|
||||
help = STRING_TOKEN(STR_SAVE_AND_EXIT),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_SAVE_AND_EXIT_DBT;
|
||||
|
||||
goto FORMID_SECURE_BOOT_OPTION_FORM,
|
||||
prompt = STRING_TOKEN(STR_NO_SAVE_AND_EXIT),
|
||||
help = STRING_TOKEN(STR_NO_SAVE_AND_EXIT),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_VALUE_NO_SAVE_AND_EXIT_DBT;
|
||||
|
||||
text
|
||||
help = STRING_TOKEN(STR_NULL),
|
||||
text = STRING_TOKEN(STR_RESTORE_KEYS_SELECTION),
|
||||
flags = INTERACTIVE,
|
||||
key = KEY_RESTORE_KEYS;
|
||||
|
||||
goto SECUREBOOT_CONFIGURATION_FORM_ID,
|
||||
prompt = STRING_TOKEN(STR_CANCEL),
|
||||
help = STRING_TOKEN(STR_NULL);
|
||||
endform;
|
||||
|
||||
endformset;
|
||||
|
@ -3142,9 +3142,9 @@ UpdateSecureBootString(
|
||||
}
|
||||
|
||||
if (*SecureBoot == SECURE_BOOT_MODE_ENABLE) {
|
||||
HiiSetString (Private->HiiHandle, STRING_TOKEN (STR_SECURE_BOOT_STATE_CONTENT), L"Enabled", NULL);
|
||||
HiiSetString (Private->HiiHandle, STRING_TOKEN (STR_SECURE_BOOT_STATE_PROMPT), L"Secure Boot state: Enabled", NULL);
|
||||
} else {
|
||||
HiiSetString (Private->HiiHandle, STRING_TOKEN (STR_SECURE_BOOT_STATE_CONTENT), L"Disabled", NULL);
|
||||
HiiSetString (Private->HiiHandle, STRING_TOKEN (STR_SECURE_BOOT_STATE_PROMPT), L"Secure Boot state: Disabled", NULL);
|
||||
}
|
||||
|
||||
FreePool(SecureBoot);
|
||||
@ -4324,7 +4324,7 @@ SecureBootCallback (
|
||||
UINT8 *SecureBootEnable;
|
||||
UINT8 *Pk;
|
||||
UINT8 *SecureBootMode;
|
||||
UINT8 *SetupMode;
|
||||
//UINT8 *SetupMode;
|
||||
CHAR16 PromptString[100];
|
||||
EFI_DEVICE_PATH_PROTOCOL *File;
|
||||
UINTN NameLength;
|
||||
@ -4332,13 +4332,11 @@ SecureBootCallback (
|
||||
SECUREBOOT_CONFIG_PRIVATE_DATA *PrivateData;
|
||||
BOOLEAN GetBrowserDataResult;
|
||||
ENROLL_KEY_ERROR EnrollKeyErrorCode;
|
||||
EFI_HII_POPUP_PROTOCOL *HiiPopup;
|
||||
EFI_HII_POPUP_SELECTION UserSelection;
|
||||
|
||||
Status = EFI_SUCCESS;
|
||||
SecureBootEnable = NULL;
|
||||
SecureBootMode = NULL;
|
||||
SetupMode = NULL;
|
||||
//SetupMode = NULL;
|
||||
File = NULL;
|
||||
EnrollKeyErrorCode = None_Error;
|
||||
|
||||
@ -4414,27 +4412,14 @@ SecureBootCallback (
|
||||
if (Action == EFI_BROWSER_ACTION_CHANGING) {
|
||||
|
||||
switch (QuestionId) {
|
||||
case KEY_SECURE_BOOT_ENABLE:
|
||||
//case KEY_SECURE_BOOT_ENABLE:
|
||||
case KEY_SECURE_BOOT_STATE_ENABLE:
|
||||
GetVariable2 (EFI_SECURE_BOOT_ENABLE_NAME, &gEfiSecureBootEnableDisableGuid, (VOID**)&SecureBootEnable, NULL);
|
||||
if (NULL != SecureBootEnable) {
|
||||
FreePool (SecureBootEnable);
|
||||
if (EFI_ERROR (SaveSecureBootVariable (Value->u8))) {
|
||||
CreatePopUp (
|
||||
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||
&Key,
|
||||
L"Only Physical Presence User could disable secure boot!",
|
||||
NULL
|
||||
);
|
||||
Status = EFI_UNSUPPORTED;
|
||||
} else {
|
||||
CreatePopUp (
|
||||
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||
&Key,
|
||||
L"Configuration changed, please reset the platform to take effect!",
|
||||
NULL
|
||||
);
|
||||
}
|
||||
}
|
||||
Status = SaveSecureBootVariable(1);
|
||||
break;
|
||||
case KEY_SECURE_BOOT_STATE_DISABLE:
|
||||
GetVariable2 (EFI_SECURE_BOOT_ENABLE_NAME, &gEfiSecureBootEnableDisableGuid, (VOID**)&SecureBootEnable, NULL);
|
||||
Status = SaveSecureBootVariable(0);
|
||||
break;
|
||||
|
||||
case KEY_SECURE_BOOT_KEK_OPTION:
|
||||
@ -4534,26 +4519,7 @@ SecureBootCallback (
|
||||
break;
|
||||
|
||||
case KEY_SECURE_BOOT_DELETE_PK:
|
||||
if (Value->u8) {
|
||||
CreatePopUp (
|
||||
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||
&Key,
|
||||
L"Are you sure you want to delete PK? Secure boot will be disabled!",
|
||||
L"Press 'Y' to delete PK and exit, 'N' to discard change and return",
|
||||
NULL
|
||||
);
|
||||
if (Key.UnicodeChar == 'y' || Key.UnicodeChar == 'Y') {
|
||||
Status = DeletePlatformKey ();
|
||||
if (EFI_ERROR (Status)) {
|
||||
CreatePopUp (
|
||||
EFI_LIGHTGRAY | EFI_BACKGROUND_BLUE,
|
||||
&Key,
|
||||
L"Only Physical Presence User could delete PK in custom mode!",
|
||||
NULL
|
||||
);
|
||||
}
|
||||
}
|
||||
}
|
||||
Status = DeletePlatformKey();
|
||||
break;
|
||||
|
||||
case KEY_DELETE_KEK:
|
||||
@ -4850,8 +4816,12 @@ SecureBootCallback (
|
||||
}
|
||||
} else if (Action == EFI_BROWSER_ACTION_CHANGED) {
|
||||
switch (QuestionId) {
|
||||
case KEY_SECURE_BOOT_ENABLE:
|
||||
//case KEY_SECURE_BOOT_ENABLE:
|
||||
case KEY_SECURE_BOOT_STATE_ENABLE:
|
||||
case KEY_SECURE_BOOT_STATE_DISABLE:
|
||||
*ActionRequest = EFI_BROWSER_ACTION_REQUEST_FORM_APPLY;
|
||||
// XXX: Is this safe?
|
||||
gRT->ResetSystem(EfiResetCold, Status, 0, NULL);
|
||||
break;
|
||||
case KEY_SECURE_BOOT_MODE:
|
||||
mIsEnterSecureBootForm = FALSE;
|
||||
@ -4870,45 +4840,33 @@ SecureBootCallback (
|
||||
*ActionRequest = EFI_BROWSER_ACTION_REQUEST_FORM_APPLY;
|
||||
break;
|
||||
case KEY_SECURE_BOOT_DELETE_PK:
|
||||
GetVariable2 (EFI_SETUP_MODE_NAME, &gEfiGlobalVariableGuid, (VOID**)&SetupMode, NULL);
|
||||
if (SetupMode == NULL || (*SetupMode) == SETUP_MODE) {
|
||||
IfrNvData->DeletePk = TRUE;
|
||||
IfrNvData->HasPk = FALSE;
|
||||
*ActionRequest = EFI_BROWSER_ACTION_REQUEST_SUBMIT;
|
||||
} else {
|
||||
IfrNvData->DeletePk = FALSE;
|
||||
IfrNvData->HasPk = TRUE;
|
||||
*ActionRequest = EFI_BROWSER_ACTION_REQUEST_FORM_APPLY;
|
||||
}
|
||||
if (SetupMode != NULL) {
|
||||
FreePool (SetupMode);
|
||||
//GetVariable2 (EFI_SETUP_MODE_NAME, &gEfiGlobalVariableGuid, (VOID**)&SetupMode, NULL);
|
||||
//if (SetupMode == NULL || (*SetupMode) == SETUP_MODE) {
|
||||
// IfrNvData->DeletePk = TRUE;
|
||||
// IfrNvData->HasPk = FALSE;
|
||||
// *ActionRequest = EFI_BROWSER_ACTION_REQUEST_SUBMIT;
|
||||
//} else {
|
||||
// IfrNvData->DeletePk = FALSE;
|
||||
// IfrNvData->HasPk = TRUE;
|
||||
// *ActionRequest = EFI_BROWSER_ACTION_REQUEST_FORM_APPLY;
|
||||
//}
|
||||
//if (SetupMode != NULL) {
|
||||
// FreePool (SetupMode);
|
||||
//}
|
||||
// XXX: Is this safe?
|
||||
gRT->ResetSystem(EfiResetCold, Status, 0, NULL);
|
||||
break;
|
||||
//case KEY_SECURE_BOOT_RESET_TO_DEFAULT:
|
||||
case KEY_RESTORE_KEYS:
|
||||
Status = KeyEnrollReset();
|
||||
// Update secure boot strings after key reset
|
||||
if (Status == EFI_SUCCESS) {
|
||||
Status = UpdateSecureBootString(Private);
|
||||
SecureBootExtractConfigFromVariable(Private, IfrNvData);
|
||||
// XXX: Is this safe?
|
||||
gRT->ResetSystem(EfiResetCold, Status, 0, NULL);
|
||||
}
|
||||
break;
|
||||
case KEY_SECURE_BOOT_RESET_TO_DEFAULT:
|
||||
{
|
||||
Status = gBS->LocateProtocol (&gEfiHiiPopupProtocolGuid, NULL, (VOID **) &HiiPopup);
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
Status = HiiPopup->CreatePopup (
|
||||
HiiPopup,
|
||||
EfiHiiPopupStyleInfo,
|
||||
EfiHiiPopupTypeYesNo,
|
||||
Private->HiiHandle,
|
||||
STRING_TOKEN (STR_RESET_TO_DEFAULTS_POPUP),
|
||||
&UserSelection
|
||||
);
|
||||
if (UserSelection == EfiHiiPopupSelectionYes) {
|
||||
Status = KeyEnrollReset ();
|
||||
}
|
||||
//
|
||||
// Update secure boot strings after key reset
|
||||
//
|
||||
if (Status == EFI_SUCCESS) {
|
||||
Status = UpdateSecureBootString (Private);
|
||||
SecureBootExtractConfigFromVariable (Private, IfrNvData);
|
||||
}
|
||||
}
|
||||
default:
|
||||
break;
|
||||
}
|
||||
|
@ -119,6 +119,15 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#define PE_IMAGE_FILE_TYPE 2
|
||||
#define AUTHENTICATION_2_FILE_TYPE 3
|
||||
|
||||
#define FORMID_SECURE_BOOT_ENABLE 0x101
|
||||
#define FORMID_SECURE_BOOT_DISABLE 0x102
|
||||
#define FORMID_DELETE_KEYS 0x103
|
||||
#define FORMID_RESTORE_KEYS 0x104
|
||||
#define KEY_SECURE_BOOT_STATE_ENABLE 0x1120
|
||||
#define KEY_SECURE_BOOT_STATE_DISABLE 0x1121
|
||||
#define KEY_DELETE_KEYS 0x1122
|
||||
#define KEY_RESTORE_KEYS 0x1123
|
||||
|
||||
//
|
||||
// Nv Data structure referenced by IFR
|
||||
//
|
||||
|
@ -138,3 +138,18 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#string STR_SIGNATURE_DATA_HELP_FORMAT_TIME #language en-US "Revocation Time:\n%s"
|
||||
|
||||
#string STR_SIGNATURE_DELETE_ALL_CONFIRM #language en-US "Press 'Y' to delete all signature List."
|
||||
|
||||
#string STR_SECURE_BOOT_ENABLE_PROMPT #language en-US "Enable Secure Boot"
|
||||
#string STR_SECURE_BOOT_DISABLE_PROMPT #language en-US "Disable Secure Boot"
|
||||
#string STR_DELETE_KEYS_PROMPT #language en-US "Delete System76 and Microsoft keys (Use your own)"
|
||||
#string STR_RESTORE_KEYS_PROMPT #language en-US "Restore System76 and Microsoft keys"
|
||||
|
||||
#string STR_ENABLE_NOTICE #language en-US "An operating system that includes Secure Boot support is required.\r\nDisable Secure Boot if your operating system does not boot."
|
||||
#string STR_ENABLE_SELECTION #language en-US "Enable Secure Boot and reboot"
|
||||
#string STR_DISABLE_NOTICE #language en-US "Disabling Secure Boot allows non-verified operating systems to boot\r\nand may disable some operating system security features."
|
||||
#string STR_DISABLE_SELECTION #language en-US "Disable Secure Boot and reboot"
|
||||
#string STR_DELETE_KEYS_NOTICE #language en-US "System and Microsoft keys will be deleted. Enroll custom keys from your\r\noperating system. Check your OS documentation for details. To facilitate\nsetup, Secure Boot is disabled until you manually activate it."
|
||||
#string STR_DELETE_KEYS_SELECTION #language en-US "Delete System76 and Microsoft keys and restart"
|
||||
#string STR_RESTORE_KEYS_NOTICE #language en-US "Restoring System76 and Microsoft keys will remove any custom keys you\r\nhave installed and may make your OS unbootable. Disable Secure Boot if\nyour operating system does not boot."
|
||||
#string STR_RESTORE_KEYS_SELECTION #language en-US "Restore System76 and Microsoft keys and restart"
|
||||
#string STR_CANCEL #language en-US "Cancel"
|
||||
|
@ -587,11 +587,16 @@ UefiMain (
|
||||
ConInHandle = NULL;
|
||||
}
|
||||
|
||||
if (!EFI_ERROR(Status) && PcdGet8(PcdShellSupportLevel) >= 1) {
|
||||
if (FALSE && !EFI_ERROR(Status) && PcdGet8(PcdShellSupportLevel) >= 1) {
|
||||
//
|
||||
// process the startup script or launch the called app.
|
||||
//
|
||||
Status = DoStartupScript(ShellInfoObject.ImageDevPath, ShellInfoObject.FileDevPath);
|
||||
} else {
|
||||
//
|
||||
// show welcome notice
|
||||
//
|
||||
ShellPrintHiiEx(-1, -1, NULL, STRING_TOKEN (STR_SHELL_WELCOME), ShellInfoObject.HiiHandle);
|
||||
}
|
||||
|
||||
if (!ShellInfoObject.ShellInitSettings.BitUnion.Bits.Exit && !ShellCommandGetExit() && (PcdGet8(PcdShellSupportLevel) >= 3 || PcdGetBool(PcdShellForceConsole)) && !EFI_ERROR(Status) && !ShellInfoObject.ShellInitSettings.BitUnion.Bits.NoConsoleIn) {
|
||||
|
@ -50,3 +50,4 @@
|
||||
|
||||
#string STR_SHELL_IMAGE_NOT_APP #language en-US "The image is not an application.\r\n"
|
||||
|
||||
#string STR_SHELL_WELCOME #language en-US "\r\nWelcome to the UEFI Shell!\r\n\r\nIf you wound up here by mistake, just type 'exit' to return to the UEFI Options Menu.\r\n\r\n"
|
||||
|
@ -2680,6 +2680,10 @@ IsMtrrSupported (
|
||||
CPUID_VERSION_INFO_EDX Edx;
|
||||
MSR_IA32_MTRRCAP_REGISTER MtrrCap;
|
||||
|
||||
if (PcdGetBool(PcdCpuDisableMtrrProgramming)) {
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
//
|
||||
// Check CPUID(1).EDX[12] for MTRR capability
|
||||
//
|
||||
|
@ -37,4 +37,4 @@
|
||||
|
||||
[Pcd]
|
||||
gUefiCpuPkgTokenSpaceGuid.PcdCpuNumberOfReservedVariableMtrrs ## SOMETIMES_CONSUMES
|
||||
|
||||
gUefiCpuPkgTokenSpaceGuid.PcdCpuDisableMtrrProgramming ## CONSUMES
|
||||
|
@ -217,6 +217,10 @@
|
||||
# @Prompt SMM Code Access Check.
|
||||
gUefiCpuPkgTokenSpaceGuid.PcdCpuSmmCodeAccessCheckEnable|TRUE|BOOLEAN|0x60000013
|
||||
|
||||
## Disables MTRR programming in case it's already programmed by FSB.
|
||||
# @Prompt Disable MTRR programming.
|
||||
gUefiCpuPkgTokenSpaceGuid.PcdCpuDisableMtrrProgramming|FALSE|BOOLEAN|0x00000017
|
||||
|
||||
## Specifies the number of variable MTRRs reserved for OS use. The default number of
|
||||
# MTRRs reserved for OS use is 2.
|
||||
# @Prompt Number of reserved variable MTRRs.
|
||||
|
@ -140,9 +140,13 @@
|
||||
|
||||
#string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuHotPlugDataAddress_HELP #language en-US "Contains the pointer to a CPU Hot Plug Data structure if CPU hot-plug is supported."
|
||||
|
||||
#string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuNumberOfReservedVariableMtrrs_PROMPT #language en-US "Number of reserved variable MTRRs"
|
||||
#string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuDisableMtrrProgramming_PROMPT #language en-US "Number of reserved variable MTRRs"
|
||||
|
||||
#string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuNumberOfReservedVariableMtrrs_HELP #language en-US "Specifies the number of variable MTRRs reserved for OS use."
|
||||
#string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuDisableMtrrProgramming_HELP #language en-US "Specifies the number of variable MTRRs reserved for OS use."
|
||||
|
||||
#string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuNumberOfReservedVariableMtrrs_PROMPT #language en-US "Disable MTRR programming."
|
||||
|
||||
#string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuNumberOfReservedVariableMtrrs_HELP #language en-US "Disables MTRR programming in case it's already programmed by FSB."
|
||||
|
||||
#string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuApLoopMode_PROMPT #language en-US "The AP wait loop state"
|
||||
|
||||
|
329
UefiPayloadPkg/BlSMMStoreDxe/BlSMMStoreDxe.c
Normal file
329
UefiPayloadPkg/BlSMMStoreDxe/BlSMMStoreDxe.c
Normal file
@ -0,0 +1,329 @@
|
||||
/** @file BlSMMStoreDxe.c
|
||||
|
||||
Copyright (c) 2020, 9elements Agency GmbH<BR>
|
||||
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
||||
#include <Library/UefiLib.h>
|
||||
#include <Library/BaseMemoryLib.h>
|
||||
#include <Library/MemoryAllocationLib.h>
|
||||
#include <Library/DxeServicesTableLib.h>
|
||||
#include <Library/UefiBootServicesTableLib.h>
|
||||
#include <Library/PcdLib.h>
|
||||
#include <Library/SMMStoreLib.h>
|
||||
#include <Library/HobLib.h>
|
||||
|
||||
#include "BlSMMStoreDxe.h"
|
||||
|
||||
STATIC EFI_EVENT mSMMStoreVirtualAddrChangeEvent;
|
||||
|
||||
//
|
||||
// Global variable declarations
|
||||
//
|
||||
SMMSTORE_INSTANCE *mSMMStoreInstance;
|
||||
|
||||
SMMSTORE_INSTANCE mSMMStoreInstanceTemplate = {
|
||||
SMMSTORE_SIGNATURE, // Signature
|
||||
NULL, // Handle ... NEED TO BE FILLED
|
||||
{
|
||||
0, // MediaId ... NEED TO BE FILLED
|
||||
FALSE, // RemovableMedia
|
||||
TRUE, // MediaPresent
|
||||
FALSE, // LogicalPartition
|
||||
FALSE, // ReadOnly
|
||||
FALSE, // WriteCaching;
|
||||
0, // BlockSize ... NEED TO BE FILLED
|
||||
4, // IoAlign
|
||||
0, // LastBlock ... NEED TO BE FILLED
|
||||
0, // LowestAlignedLba
|
||||
1, // LogicalBlocksPerPhysicalBlock
|
||||
}, //Media;
|
||||
|
||||
{
|
||||
FvbGetAttributes, // GetAttributes
|
||||
FvbSetAttributes, // SetAttributes
|
||||
FvbGetPhysicalAddress, // GetPhysicalAddress
|
||||
FvbGetBlockSize, // GetBlockSize
|
||||
FvbRead, // Read
|
||||
FvbWrite, // Write
|
||||
FvbEraseBlocks, // EraseBlocks
|
||||
NULL, //ParentHandle
|
||||
}, // FvbProtoccol;
|
||||
{
|
||||
{
|
||||
{
|
||||
HARDWARE_DEVICE_PATH,
|
||||
HW_VENDOR_DP,
|
||||
{
|
||||
(UINT8)(OFFSET_OF (NOR_FLASH_DEVICE_PATH, End)),
|
||||
(UINT8)(OFFSET_OF (NOR_FLASH_DEVICE_PATH, End) >> 8)
|
||||
}
|
||||
},
|
||||
{ 0x0, 0x0, 0x0, { 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0 } }, // GUID ... NEED TO BE FILLED
|
||||
},
|
||||
0, // Index
|
||||
{
|
||||
END_DEVICE_PATH_TYPE,
|
||||
END_ENTIRE_DEVICE_PATH_SUBTYPE,
|
||||
{ sizeof (EFI_DEVICE_PATH_PROTOCOL), 0 }
|
||||
}
|
||||
} // DevicePath
|
||||
};
|
||||
|
||||
STATIC
|
||||
EFI_STATUS
|
||||
SMMStoreCreateInstance (
|
||||
IN UINTN NumberofBlocks,
|
||||
IN UINTN BlockSize,
|
||||
OUT SMMSTORE_INSTANCE** SMMStoreInstance
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
SMMSTORE_INSTANCE* Instance;
|
||||
|
||||
ASSERT(SMMStoreInstance != NULL);
|
||||
|
||||
Instance = AllocateRuntimeCopyPool (sizeof(SMMSTORE_INSTANCE),&mSMMStoreInstanceTemplate);
|
||||
if (Instance == NULL) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
||||
Instance->Media.MediaId = 0;
|
||||
Instance->Media.BlockSize = BlockSize;
|
||||
Instance->Media.LastBlock = NumberofBlocks - 1;
|
||||
|
||||
CopyGuid (&Instance->DevicePath.Vendor.Guid, &gEfiCallerIdGuid);
|
||||
Instance->DevicePath.Index = (UINT8)0;
|
||||
|
||||
Status = SMMStoreFvbInitialize (Instance);
|
||||
if (EFI_ERROR(Status)) {
|
||||
FreePool (Instance);
|
||||
return Status;
|
||||
}
|
||||
|
||||
Status = gBS->InstallMultipleProtocolInterfaces (
|
||||
&Instance->Handle,
|
||||
&gEfiDevicePathProtocolGuid, &Instance->DevicePath,
|
||||
&gEfiFirmwareVolumeBlockProtocolGuid, &Instance->FvbProtocol,
|
||||
NULL
|
||||
);
|
||||
if (EFI_ERROR(Status)) {
|
||||
FreePool (Instance);
|
||||
return Status;
|
||||
}
|
||||
|
||||
DEBUG((DEBUG_INFO, "%a: Created a new instance\n", __FUNCTION__));
|
||||
|
||||
*SMMStoreInstance = Instance;
|
||||
return Status;
|
||||
}
|
||||
|
||||
/**
|
||||
Fixup internal data so that EFI can be call in virtual mode.
|
||||
Call the passed in Child Notify event and convert any pointers in
|
||||
lib to virtual mode.
|
||||
|
||||
@param[in] Event The Event that is being processed
|
||||
@param[in] Context Event Context
|
||||
**/
|
||||
VOID
|
||||
EFIAPI
|
||||
BlSMMStoreVirtualNotifyEvent (
|
||||
IN EFI_EVENT Event,
|
||||
IN VOID *Context
|
||||
)
|
||||
{
|
||||
// Convert Fvb
|
||||
EfiConvertPointer (0x0, (VOID**)&mSMMStoreInstance->FvbProtocol.EraseBlocks);
|
||||
EfiConvertPointer (0x0, (VOID**)&mSMMStoreInstance->FvbProtocol.GetAttributes);
|
||||
EfiConvertPointer (0x0, (VOID**)&mSMMStoreInstance->FvbProtocol.GetBlockSize);
|
||||
EfiConvertPointer (0x0, (VOID**)&mSMMStoreInstance->FvbProtocol.GetPhysicalAddress);
|
||||
EfiConvertPointer (0x0, (VOID**)&mSMMStoreInstance->FvbProtocol.Read);
|
||||
EfiConvertPointer (0x0, (VOID**)&mSMMStoreInstance->FvbProtocol.SetAttributes);
|
||||
EfiConvertPointer (0x0, (VOID**)&mSMMStoreInstance->FvbProtocol.Write);
|
||||
|
||||
SMMStoreVirtualNotifyEvent (Event, Context);
|
||||
|
||||
return;
|
||||
}
|
||||
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
BlSMMSTOREInitialise (
|
||||
IN EFI_HANDLE ImageHandle,
|
||||
IN EFI_SYSTEM_TABLE *SystemTable
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
VOID *ComBuf;
|
||||
VOID *GuidHob;
|
||||
SMMSTORE_INFO *SMMStoreInfoHob;
|
||||
EFI_GCD_MEMORY_SPACE_DESCRIPTOR GcdDescriptor;
|
||||
|
||||
if (PcdGetBool (PcdEmuVariableNvModeEnable)) {
|
||||
DEBUG ((DEBUG_WARN, "Variable emulation is active! Skipping driver init.\n"));
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
//
|
||||
// Find the SMMSTORE information guid hob
|
||||
//
|
||||
GuidHob = GetFirstGuidHob (&gEfiSMMSTOREInfoHobGuid);
|
||||
if (GuidHob == NULL) {
|
||||
DEBUG ((DEBUG_WARN, "SMMSTORE not supported! Skipping driver init.\n"));
|
||||
PcdSetBoolS (PcdEmuVariableNvModeEnable, TRUE);
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
//
|
||||
// Allocate Communication Buffer for arguments to pass to SMM
|
||||
//
|
||||
ComBuf = AllocateRuntimePool (SMMSTORE_COMBUF_SIZE);
|
||||
if (!ComBuf) {
|
||||
PcdSetBoolS (PcdEmuVariableNvModeEnable, TRUE);
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
||||
//
|
||||
// Place SMMSTORE information hob in a runtime buffer
|
||||
//
|
||||
SMMStoreInfoHob = AllocateRuntimePool (GET_GUID_HOB_DATA_SIZE(GuidHob));
|
||||
if (!SMMStoreInfoHob) {
|
||||
FreePool(ComBuf);
|
||||
PcdSetBoolS (PcdEmuVariableNvModeEnable, TRUE);
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
||||
CopyMem(SMMStoreInfoHob, GET_GUID_HOB_DATA (GuidHob), GET_GUID_HOB_DATA_SIZE(GuidHob));
|
||||
|
||||
if (!SMMStoreInfoHob->MmioAddress ||
|
||||
!SMMStoreInfoHob->ComBuffer ||
|
||||
!SMMStoreInfoHob->BlockSize ||
|
||||
!SMMStoreInfoHob->NumBlocks) {
|
||||
DEBUG((DEBUG_ERROR, "%a: Invalid data in SMMStore Info hob\n", __FUNCTION__));
|
||||
FreePool(ComBuf);
|
||||
FreePool(SMMStoreInfoHob);
|
||||
PcdSetBoolS (PcdEmuVariableNvModeEnable, TRUE);
|
||||
return EFI_WRITE_PROTECTED;
|
||||
}
|
||||
|
||||
//
|
||||
// Update PCDs for VariableRuntimeDxe
|
||||
// Can't do it later as VariableRuntimeDxe has no Depex
|
||||
//
|
||||
PcdSet32S (PcdFlashNvStorageVariableBase,
|
||||
PcdGet32 (PcdFlashNvStorageVariableBase) + SMMStoreInfoHob->MmioAddress);
|
||||
PcdSet32S (PcdFlashNvStorageFtwWorkingBase,
|
||||
PcdGet32 (PcdFlashNvStorageFtwWorkingBase) + SMMStoreInfoHob->MmioAddress);
|
||||
PcdSet32S (PcdFlashNvStorageFtwSpareBase,
|
||||
PcdGet32 (PcdFlashNvStorageFtwSpareBase) + SMMStoreInfoHob->MmioAddress);
|
||||
|
||||
Status = SMMStoreInitialize(ComBuf, SMMStoreInfoHob);
|
||||
if (EFI_ERROR(Status)) {
|
||||
DEBUG((DEBUG_ERROR,"%a: Failed to initialize SMMStore\n",
|
||||
__FUNCTION__));
|
||||
FreePool(ComBuf);
|
||||
FreePool(SMMStoreInfoHob);
|
||||
PcdSetBoolS (PcdEmuVariableNvModeEnable, TRUE);
|
||||
return Status;
|
||||
}
|
||||
|
||||
mSMMStoreInstance = AllocateRuntimePool (sizeof(SMMSTORE_INSTANCE*));
|
||||
if (!mSMMStoreInstance) {
|
||||
DEBUG((DEBUG_ERROR, "%a: Out of resources\n", __FUNCTION__));
|
||||
FreePool(ComBuf);
|
||||
FreePool(SMMStoreInfoHob);
|
||||
PcdSetBoolS (PcdEmuVariableNvModeEnable, TRUE);
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
||||
Status = SMMStoreCreateInstance (
|
||||
SMMStoreInfoHob->NumBlocks,
|
||||
SMMStoreInfoHob->BlockSize,
|
||||
&mSMMStoreInstance
|
||||
);
|
||||
if (EFI_ERROR(Status)) {
|
||||
DEBUG((DEBUG_ERROR, "%a: Fail to create instance for SMMStore\n",
|
||||
__FUNCTION__));
|
||||
FreePool(ComBuf);
|
||||
FreePool(SMMStoreInfoHob);
|
||||
PcdSetBoolS (PcdEmuVariableNvModeEnable, TRUE);
|
||||
return Status;
|
||||
}
|
||||
|
||||
//
|
||||
// Register for the virtual address change event
|
||||
//
|
||||
Status = gBS->CreateEventEx (
|
||||
EVT_NOTIFY_SIGNAL,
|
||||
TPL_NOTIFY,
|
||||
BlSMMStoreVirtualNotifyEvent,
|
||||
NULL,
|
||||
&gEfiEventVirtualAddressChangeGuid,
|
||||
&mSMMStoreVirtualAddrChangeEvent
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
//
|
||||
// Finally mark the SMM communication buffer provided by CB or SBL as runtime memory
|
||||
//
|
||||
Status = gDS->GetMemorySpaceDescriptor (SMMStoreInfoHob->ComBuffer, &GcdDescriptor);
|
||||
if (EFI_ERROR (Status) || GcdDescriptor.GcdMemoryType != EfiGcdMemoryTypeReserved) {
|
||||
DEBUG((DEBUG_INFO, "%a: No reserved memory space descriptor for com buffer found\n",
|
||||
__FUNCTION__));
|
||||
|
||||
//
|
||||
// Add a new entry if not covered by existing mapping
|
||||
//
|
||||
Status = gDS->AddMemorySpace (
|
||||
EfiGcdMemoryTypeReserved,
|
||||
SMMStoreInfoHob->ComBuffer, SMMStoreInfoHob->ComBufferSize,
|
||||
EFI_MEMORY_WB | EFI_MEMORY_RUNTIME
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
}
|
||||
|
||||
//
|
||||
// Mark as runtime service
|
||||
//
|
||||
Status = gDS->SetMemorySpaceAttributes (
|
||||
SMMStoreInfoHob->ComBuffer,
|
||||
SMMStoreInfoHob->ComBufferSize,
|
||||
EFI_MEMORY_RUNTIME
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
//
|
||||
// Mark the memory mapped store as MMIO memory
|
||||
//
|
||||
Status = gDS->GetMemorySpaceDescriptor (SMMStoreInfoHob->MmioAddress, &GcdDescriptor);
|
||||
if (EFI_ERROR (Status) || GcdDescriptor.GcdMemoryType != EfiGcdMemoryTypeMemoryMappedIo) {
|
||||
DEBUG((DEBUG_INFO, "%a: No MMIO memory space descriptor for com buffer found\n",
|
||||
__FUNCTION__));
|
||||
|
||||
//
|
||||
// Add a new entry if not covered by existing mapping
|
||||
//
|
||||
Status = gDS->AddMemorySpace (
|
||||
EfiGcdMemoryTypeMemoryMappedIo,
|
||||
SMMStoreInfoHob->MmioAddress,
|
||||
SMMStoreInfoHob->NumBlocks * SMMStoreInfoHob->BlockSize,
|
||||
EFI_MEMORY_UC | EFI_MEMORY_RUNTIME
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
}
|
||||
|
||||
//
|
||||
// Mark as runtime service
|
||||
//
|
||||
Status = gDS->SetMemorySpaceAttributes (
|
||||
SMMStoreInfoHob->MmioAddress,
|
||||
SMMStoreInfoHob->NumBlocks * SMMStoreInfoHob->BlockSize,
|
||||
EFI_MEMORY_RUNTIME
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
return Status;
|
||||
}
|
118
UefiPayloadPkg/BlSMMStoreDxe/BlSMMStoreDxe.h
Normal file
118
UefiPayloadPkg/BlSMMStoreDxe/BlSMMStoreDxe.h
Normal file
@ -0,0 +1,118 @@
|
||||
/** @file BlSMMStoreDxe.h
|
||||
|
||||
Copyright (c) 2020, 9elements Agency GmbH<BR>
|
||||
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
||||
#ifndef __COREBOOT_SMM_STORE_DXE_H__
|
||||
#define __COREBOOT_SMM_STORE_DXE_H__
|
||||
|
||||
|
||||
#include <Base.h>
|
||||
#include <PiDxe.h>
|
||||
|
||||
#include <Guid/EventGroup.h>
|
||||
|
||||
#include <Protocol/BlockIo.h>
|
||||
#include <Protocol/DiskIo.h>
|
||||
#include <Protocol/FirmwareVolumeBlock.h>
|
||||
|
||||
#include <Library/DebugLib.h>
|
||||
#include <Library/IoLib.h>
|
||||
#include <Library/UefiLib.h>
|
||||
#include <Library/UefiRuntimeLib.h>
|
||||
|
||||
#define SMMSTORE_SIGNATURE SIGNATURE_32('S', 'M', 'M', 'S')
|
||||
#define INSTANCE_FROM_FVB_THIS(a) CR(a, SMMSTORE_INSTANCE, FvbProtocol, SMMSTORE_SIGNATURE)
|
||||
|
||||
typedef struct _SMMSTORE_INSTANCE SMMSTORE_INSTANCE;
|
||||
|
||||
#pragma pack (1)
|
||||
typedef struct {
|
||||
VENDOR_DEVICE_PATH Vendor;
|
||||
UINT8 Index;
|
||||
EFI_DEVICE_PATH_PROTOCOL End;
|
||||
} NOR_FLASH_DEVICE_PATH;
|
||||
#pragma pack ()
|
||||
|
||||
struct _SMMSTORE_INSTANCE {
|
||||
UINT32 Signature;
|
||||
EFI_HANDLE Handle;
|
||||
EFI_BLOCK_IO_MEDIA Media;
|
||||
|
||||
EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL FvbProtocol;
|
||||
|
||||
NOR_FLASH_DEVICE_PATH DevicePath;
|
||||
};
|
||||
|
||||
//
|
||||
// BlSMMStoreFvbDxe.c
|
||||
//
|
||||
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
SMMStoreFvbInitialize (
|
||||
IN SMMSTORE_INSTANCE* Instance
|
||||
);
|
||||
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbGetAttributes(
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
OUT EFI_FVB_ATTRIBUTES_2 *Attributes
|
||||
);
|
||||
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbSetAttributes(
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
IN OUT EFI_FVB_ATTRIBUTES_2 *Attributes
|
||||
);
|
||||
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbGetPhysicalAddress(
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Address
|
||||
);
|
||||
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbGetBlockSize(
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
IN EFI_LBA Lba,
|
||||
OUT UINTN *BlockSize,
|
||||
OUT UINTN *NumberOfBlocks
|
||||
);
|
||||
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbRead(
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
IN EFI_LBA Lba,
|
||||
IN UINTN Offset,
|
||||
IN OUT UINTN *NumBytes,
|
||||
IN OUT UINT8 *Buffer
|
||||
);
|
||||
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbWrite(
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
IN EFI_LBA Lba,
|
||||
IN UINTN Offset,
|
||||
IN OUT UINTN *NumBytes,
|
||||
IN UINT8 *Buffer
|
||||
);
|
||||
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbEraseBlocks(
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
...
|
||||
);
|
||||
|
||||
|
||||
#endif /* __COREBOOT_SMM_STORE_DXE_H__ */
|
62
UefiPayloadPkg/BlSMMStoreDxe/BlSMMStoreDxe.inf
Normal file
62
UefiPayloadPkg/BlSMMStoreDxe/BlSMMStoreDxe.inf
Normal file
@ -0,0 +1,62 @@
|
||||
#/** @file
|
||||
#
|
||||
# Component description file for SMMSTORE module
|
||||
#
|
||||
# Copyright (c) 2020, 9elements Agency GmbH<BR>
|
||||
#
|
||||
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#
|
||||
#**/
|
||||
[Defines]
|
||||
INF_VERSION = 0x00010005
|
||||
BASE_NAME = UefiPayloadBlSMMStoreDxe
|
||||
FILE_GUID = A0402FCA-6B25-4CEA-B7DD-C08F99714B29
|
||||
MODULE_TYPE = DXE_RUNTIME_DRIVER
|
||||
VERSION_STRING = 1.0
|
||||
ENTRY_POINT = BlSMMSTOREInitialise
|
||||
|
||||
[Sources.common]
|
||||
BlSMMStoreDxe.h
|
||||
BlSMMStoreDxe.c
|
||||
BlSMMStoreFvbDxe.c
|
||||
|
||||
[Packages]
|
||||
MdePkg/MdePkg.dec
|
||||
MdeModulePkg/MdeModulePkg.dec
|
||||
EmbeddedPkg/EmbeddedPkg.dec
|
||||
UefiPayloadPkg/UefiPayloadPkg.dec
|
||||
|
||||
[LibraryClasses]
|
||||
BaseLib
|
||||
DebugLib
|
||||
HobLib
|
||||
SmmStoreLib
|
||||
UefiLib
|
||||
UefiDriverEntryPoint
|
||||
UefiBootServicesTableLib
|
||||
UefiRuntimeLib
|
||||
DxeServicesTableLib
|
||||
|
||||
[Guids]
|
||||
gEfiSystemNvDataFvGuid
|
||||
gEfiVariableGuid
|
||||
gEfiAuthenticatedVariableGuid
|
||||
gEfiEventVirtualAddressChangeGuid
|
||||
gEdkiiNvVarStoreFormattedGuid ## PRODUCES ## PROTOCOL
|
||||
gEfiSMMSTOREInfoHobGuid ## CONSUMES
|
||||
|
||||
[Protocols]
|
||||
gEfiDevicePathProtocolGuid ## BY_START
|
||||
gEfiFirmwareVolumeBlockProtocolGuid ## BY_START
|
||||
|
||||
[Pcd]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingSize
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareSize
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdEmuVariableNvModeEnable
|
||||
|
||||
[Depex]
|
||||
BEFORE gVariableRuntimeDxeFileGuid
|
817
UefiPayloadPkg/BlSMMStoreDxe/BlSMMStoreFvbDxe.c
Normal file
817
UefiPayloadPkg/BlSMMStoreDxe/BlSMMStoreFvbDxe.c
Normal file
@ -0,0 +1,817 @@
|
||||
/*++ @file BlSMMStoreFvbDxe.c
|
||||
|
||||
Copyright (c) 2020, 9elements Agency GmbH<BR>
|
||||
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
--*/
|
||||
|
||||
#include <PiDxe.h>
|
||||
|
||||
#include <Library/PcdLib.h>
|
||||
#include <Library/BaseLib.h>
|
||||
#include <Library/HobLib.h>
|
||||
#include <Library/UefiLib.h>
|
||||
#include <Library/BaseMemoryLib.h>
|
||||
#include <Library/MemoryAllocationLib.h>
|
||||
#include <Library/DxeServicesTableLib.h>
|
||||
#include <Library/UefiBootServicesTableLib.h>
|
||||
#include <Library/SMMStoreLib.h>
|
||||
|
||||
#include <Guid/VariableFormat.h>
|
||||
#include <Guid/SystemNvDataGuid.h>
|
||||
#include <Guid/NvVarStoreFormatted.h>
|
||||
|
||||
#include "BlSMMStoreDxe.h"
|
||||
|
||||
STATIC EFI_EVENT mFvbVirtualAddrChangeEvent;
|
||||
STATIC UINTN mFlashNvStorageVariableBase;
|
||||
|
||||
///
|
||||
/// The Firmware Volume Block Protocol is the low-level interface
|
||||
/// to a firmware volume. File-level access to a firmware volume
|
||||
/// should not be done using the Firmware Volume Block Protocol.
|
||||
/// Normal access to a firmware volume must use the Firmware
|
||||
/// Volume Protocol. Typically, only the file system driver that
|
||||
/// produces the Firmware Volume Protocol will bind to the
|
||||
/// Firmware Volume Block Protocol.
|
||||
///
|
||||
|
||||
/**
|
||||
Initialises the FV Header and Variable Store Header
|
||||
to support variable operations.
|
||||
|
||||
@param[in] Ptr - Location to initialise the headers
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
InitializeFvAndVariableStoreHeaders (
|
||||
IN SMMSTORE_INSTANCE *Instance
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
VOID* Headers;
|
||||
UINTN HeadersLength;
|
||||
EFI_FIRMWARE_VOLUME_HEADER *FirmwareVolumeHeader;
|
||||
VARIABLE_STORE_HEADER *VariableStoreHeader;
|
||||
|
||||
HeadersLength = sizeof(EFI_FIRMWARE_VOLUME_HEADER) + sizeof(EFI_FV_BLOCK_MAP_ENTRY) + sizeof(VARIABLE_STORE_HEADER);
|
||||
Headers = AllocateZeroPool(HeadersLength);
|
||||
|
||||
// FirmwareVolumeHeader->FvLength is declared to have the Variable area AND the FTW working area AND the FTW Spare contiguous.
|
||||
ASSERT(PcdGet32(PcdFlashNvStorageVariableBase) + PcdGet32(PcdFlashNvStorageVariableSize) == PcdGet32(PcdFlashNvStorageFtwWorkingBase));
|
||||
ASSERT(PcdGet32(PcdFlashNvStorageFtwWorkingBase) + PcdGet32(PcdFlashNvStorageFtwWorkingSize) == PcdGet32(PcdFlashNvStorageFtwSpareBase));
|
||||
|
||||
// Check if the size of the area is at least one block size
|
||||
ASSERT((PcdGet32(PcdFlashNvStorageVariableSize) > 0) && (PcdGet32(PcdFlashNvStorageVariableSize) / Instance->Media.BlockSize > 0));
|
||||
ASSERT((PcdGet32(PcdFlashNvStorageFtwWorkingSize) > 0) && (PcdGet32(PcdFlashNvStorageFtwWorkingSize) / Instance->Media.BlockSize > 0));
|
||||
ASSERT((PcdGet32(PcdFlashNvStorageFtwSpareSize) > 0) && (PcdGet32(PcdFlashNvStorageFtwSpareSize) / Instance->Media.BlockSize > 0));
|
||||
|
||||
// Ensure the Variable area Base Addresses are aligned on a block size boundaries
|
||||
ASSERT(PcdGet32(PcdFlashNvStorageVariableBase) % Instance->Media.BlockSize == 0);
|
||||
ASSERT(PcdGet32(PcdFlashNvStorageFtwWorkingBase) % Instance->Media.BlockSize == 0);
|
||||
ASSERT(PcdGet32(PcdFlashNvStorageFtwSpareBase) % Instance->Media.BlockSize == 0);
|
||||
|
||||
//
|
||||
// EFI_FIRMWARE_VOLUME_HEADER
|
||||
//
|
||||
FirmwareVolumeHeader = (EFI_FIRMWARE_VOLUME_HEADER*)Headers;
|
||||
CopyGuid (&FirmwareVolumeHeader->FileSystemGuid, &gEfiSystemNvDataFvGuid);
|
||||
FirmwareVolumeHeader->FvLength =
|
||||
PcdGet32(PcdFlashNvStorageVariableSize) +
|
||||
PcdGet32(PcdFlashNvStorageFtwWorkingSize) +
|
||||
PcdGet32(PcdFlashNvStorageFtwSpareSize);
|
||||
FirmwareVolumeHeader->Signature = EFI_FVH_SIGNATURE;
|
||||
FirmwareVolumeHeader->Attributes = (EFI_FVB_ATTRIBUTES_2) (
|
||||
EFI_FVB2_READ_ENABLED_CAP | // Reads may be enabled
|
||||
EFI_FVB2_READ_STATUS | // Reads are currently enabled
|
||||
EFI_FVB2_STICKY_WRITE | // A block erase is required to flip bits into EFI_FVB2_ERASE_POLARITY
|
||||
EFI_FVB2_MEMORY_MAPPED | // It is memory mapped
|
||||
EFI_FVB2_ERASE_POLARITY | // After erasure all bits take this value (i.e. '1')
|
||||
EFI_FVB2_WRITE_STATUS | // Writes are currently enabled
|
||||
EFI_FVB2_WRITE_ENABLED_CAP // Writes may be enabled
|
||||
);
|
||||
FirmwareVolumeHeader->HeaderLength = sizeof(EFI_FIRMWARE_VOLUME_HEADER) + sizeof(EFI_FV_BLOCK_MAP_ENTRY);
|
||||
FirmwareVolumeHeader->Revision = EFI_FVH_REVISION;
|
||||
FirmwareVolumeHeader->BlockMap[0].NumBlocks = Instance->Media.LastBlock + 1;
|
||||
FirmwareVolumeHeader->BlockMap[0].Length = Instance->Media.BlockSize;
|
||||
FirmwareVolumeHeader->BlockMap[1].NumBlocks = 0;
|
||||
FirmwareVolumeHeader->BlockMap[1].Length = 0;
|
||||
FirmwareVolumeHeader->Checksum = CalculateCheckSum16 ((UINT16*)FirmwareVolumeHeader,FirmwareVolumeHeader->HeaderLength);
|
||||
|
||||
//
|
||||
// VARIABLE_STORE_HEADER
|
||||
//
|
||||
VariableStoreHeader = (VARIABLE_STORE_HEADER*)((UINTN)Headers + FirmwareVolumeHeader->HeaderLength);
|
||||
//
|
||||
// Should be gEfiVariableGuid as SMM doesn't authenticate, but userspace does
|
||||
// Must be gEfiAuthenticatedVariableGuid for SecureBoot
|
||||
//
|
||||
CopyGuid (&VariableStoreHeader->Signature, &gEfiAuthenticatedVariableGuid);
|
||||
VariableStoreHeader->Size = PcdGet32(PcdFlashNvStorageVariableSize) - FirmwareVolumeHeader->HeaderLength;
|
||||
VariableStoreHeader->Format = VARIABLE_STORE_FORMATTED;
|
||||
VariableStoreHeader->State = VARIABLE_STORE_HEALTHY;
|
||||
|
||||
// Install the combined super-header in the store
|
||||
Status = FvbWrite (&Instance->FvbProtocol, 0, 0, &HeadersLength, Headers);
|
||||
|
||||
FreePool (Headers);
|
||||
return Status;
|
||||
}
|
||||
|
||||
/**
|
||||
Check the integrity of firmware volume header.
|
||||
|
||||
@param[in] FwVolHeader - A pointer to a firmware volume header
|
||||
|
||||
@retval EFI_SUCCESS - The firmware volume is consistent
|
||||
@retval EFI_NOT_FOUND - The firmware volume has been corrupted.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
ValidateFvHeader (
|
||||
IN SMMSTORE_INSTANCE *Instance
|
||||
)
|
||||
{
|
||||
UINT16 Checksum;
|
||||
EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;
|
||||
VARIABLE_STORE_HEADER *VariableStoreHeader;
|
||||
UINTN VariableStoreLength;
|
||||
UINTN FvLength;
|
||||
EFI_STATUS TempStatus;
|
||||
UINTN BufferSize;
|
||||
UINTN BufferSizeReqested;
|
||||
|
||||
BufferSizeReqested = sizeof(EFI_FIRMWARE_VOLUME_HEADER);
|
||||
FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER*)AllocatePool(BufferSizeReqested);
|
||||
if (!FwVolHeader) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
BufferSize = BufferSizeReqested;
|
||||
TempStatus = SMMStoreRead (0, 0, &BufferSize, (UINT8 *)FwVolHeader);
|
||||
if (EFI_ERROR (TempStatus) || BufferSizeReqested != BufferSize) {
|
||||
FreePool (FwVolHeader);
|
||||
return EFI_DEVICE_ERROR;
|
||||
}
|
||||
|
||||
FvLength = PcdGet32(PcdFlashNvStorageVariableSize) + PcdGet32(PcdFlashNvStorageFtwWorkingSize) +
|
||||
PcdGet32(PcdFlashNvStorageFtwSpareSize);
|
||||
|
||||
//
|
||||
// Verify the header revision, header signature, length
|
||||
// Length of FvBlock cannot be 2**64-1
|
||||
// HeaderLength cannot be an odd number
|
||||
//
|
||||
if ( (FwVolHeader->Revision != EFI_FVH_REVISION)
|
||||
|| (FwVolHeader->Signature != EFI_FVH_SIGNATURE)
|
||||
|| (FwVolHeader->FvLength != FvLength)
|
||||
)
|
||||
{
|
||||
DEBUG ((DEBUG_INFO, "%a: No Firmware Volume header present\n",
|
||||
__FUNCTION__));
|
||||
FreePool (FwVolHeader);
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
// Check the Firmware Volume Guid
|
||||
if( CompareGuid (&FwVolHeader->FileSystemGuid, &gEfiSystemNvDataFvGuid) == FALSE ) {
|
||||
DEBUG ((DEBUG_INFO, "%a: Firmware Volume Guid non-compatible\n",
|
||||
__FUNCTION__));
|
||||
FreePool (FwVolHeader);
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
BufferSizeReqested = FwVolHeader->HeaderLength;
|
||||
FreePool (FwVolHeader);
|
||||
FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER*)AllocatePool(BufferSizeReqested);
|
||||
if (!FwVolHeader) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
BufferSize = BufferSizeReqested;
|
||||
TempStatus = SMMStoreRead (0, 0, &BufferSize, (UINT8 *)FwVolHeader);
|
||||
if (EFI_ERROR (TempStatus) || BufferSizeReqested != BufferSize) {
|
||||
FreePool (FwVolHeader);
|
||||
return EFI_DEVICE_ERROR;
|
||||
}
|
||||
|
||||
// Verify the header checksum
|
||||
Checksum = CalculateSum16((UINT16*)FwVolHeader, FwVolHeader->HeaderLength);
|
||||
if (Checksum != 0) {
|
||||
DEBUG ((DEBUG_INFO, "%a: FV checksum is invalid (Checksum:0x%X)\n",
|
||||
__FUNCTION__, Checksum));
|
||||
FreePool (FwVolHeader);
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
BufferSizeReqested = sizeof(VARIABLE_STORE_HEADER);
|
||||
VariableStoreHeader = (VARIABLE_STORE_HEADER*)AllocatePool(BufferSizeReqested);
|
||||
if (!VariableStoreHeader) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
BufferSize = BufferSizeReqested;
|
||||
TempStatus = SMMStoreRead (0, FwVolHeader->HeaderLength, &BufferSize, (UINT8 *)VariableStoreHeader);
|
||||
if (EFI_ERROR (TempStatus) || BufferSizeReqested != BufferSize) {
|
||||
FreePool (VariableStoreHeader);
|
||||
FreePool (FwVolHeader);
|
||||
return EFI_DEVICE_ERROR;
|
||||
}
|
||||
|
||||
// Check the Variable Store Guid
|
||||
if (!CompareGuid (&VariableStoreHeader->Signature, &gEfiVariableGuid) &&
|
||||
!CompareGuid (&VariableStoreHeader->Signature, &gEfiAuthenticatedVariableGuid)) {
|
||||
DEBUG ((DEBUG_INFO, "%a: Variable Store Guid non-compatible\n",
|
||||
__FUNCTION__));
|
||||
FreePool (FwVolHeader);
|
||||
FreePool (VariableStoreHeader);
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
VariableStoreLength = PcdGet32 (PcdFlashNvStorageVariableSize) - FwVolHeader->HeaderLength;
|
||||
if (VariableStoreHeader->Size != VariableStoreLength) {
|
||||
DEBUG ((DEBUG_INFO, "%a: Variable Store Length does not match\n",
|
||||
__FUNCTION__));
|
||||
FreePool (FwVolHeader);
|
||||
FreePool (VariableStoreHeader);
|
||||
return EFI_NOT_FOUND;
|
||||
}
|
||||
|
||||
FreePool (FwVolHeader);
|
||||
FreePool (VariableStoreHeader);
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
/**
|
||||
The GetAttributes() function retrieves the attributes and
|
||||
current settings of the block.
|
||||
|
||||
@param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
|
||||
|
||||
@param Attributes Pointer to EFI_FVB_ATTRIBUTES_2 in which the attributes and
|
||||
current settings are returned.
|
||||
Type EFI_FVB_ATTRIBUTES_2 is defined in EFI_FIRMWARE_VOLUME_HEADER.
|
||||
|
||||
@retval EFI_SUCCESS The firmware volume attributes were returned.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbGetAttributes(
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
OUT EFI_FVB_ATTRIBUTES_2 *Attributes
|
||||
)
|
||||
{
|
||||
EFI_FVB_ATTRIBUTES_2 FlashFvbAttributes;
|
||||
SMMSTORE_INSTANCE *Instance;
|
||||
|
||||
Instance = INSTANCE_FROM_FVB_THIS(This);
|
||||
|
||||
FlashFvbAttributes = (EFI_FVB_ATTRIBUTES_2) (
|
||||
|
||||
EFI_FVB2_READ_ENABLED_CAP | // Reads may be enabled
|
||||
EFI_FVB2_READ_STATUS | // Reads are currently enabled
|
||||
EFI_FVB2_STICKY_WRITE | // A block erase is required to flip bits into EFI_FVB2_ERASE_POLARITY
|
||||
EFI_FVB2_MEMORY_MAPPED | // It is memory mapped
|
||||
EFI_FVB2_ERASE_POLARITY // After erasure all bits take this value (i.e. '1')
|
||||
|
||||
);
|
||||
|
||||
// Check if it is write protected
|
||||
if (Instance->Media.ReadOnly != TRUE) {
|
||||
|
||||
FlashFvbAttributes = FlashFvbAttributes |
|
||||
EFI_FVB2_WRITE_STATUS | // Writes are currently enabled
|
||||
EFI_FVB2_WRITE_ENABLED_CAP; // Writes may be enabled
|
||||
}
|
||||
|
||||
*Attributes = FlashFvbAttributes;
|
||||
|
||||
DEBUG ((DEBUG_BLKIO, "FvbGetAttributes(0x%X)\n", *Attributes));
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
/**
|
||||
The SetAttributes() function sets configurable firmware volume attributes
|
||||
and returns the new settings of the firmware volume.
|
||||
|
||||
|
||||
@param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
|
||||
|
||||
@param Attributes On input, Attributes is a pointer to EFI_FVB_ATTRIBUTES_2
|
||||
that contains the desired firmware volume settings.
|
||||
On successful return, it contains the new settings of
|
||||
the firmware volume.
|
||||
Type EFI_FVB_ATTRIBUTES_2 is defined in EFI_FIRMWARE_VOLUME_HEADER.
|
||||
|
||||
@retval EFI_SUCCESS The firmware volume attributes were returned.
|
||||
|
||||
@retval EFI_INVALID_PARAMETER The attributes requested are in conflict with the capabilities
|
||||
as declared in the firmware volume header.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbSetAttributes(
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
IN OUT EFI_FVB_ATTRIBUTES_2 *Attributes
|
||||
)
|
||||
{
|
||||
DEBUG ((DEBUG_BLKIO, "FvbSetAttributes(0x%X) is not supported\n",*Attributes));
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
||||
/**
|
||||
The GetPhysicalAddress() function retrieves the base address of
|
||||
a memory-mapped firmware volume. This function should be called
|
||||
only for memory-mapped firmware volumes.
|
||||
|
||||
@param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
|
||||
|
||||
@param Address Pointer to a caller-allocated
|
||||
EFI_PHYSICAL_ADDRESS that, on successful
|
||||
return from GetPhysicalAddress(), contains the
|
||||
base address of the firmware volume.
|
||||
|
||||
@retval EFI_SUCCESS The firmware volume base address was returned.
|
||||
|
||||
@retval EFI_NOT_SUPPORTED The firmware volume is not memory mapped.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbGetPhysicalAddress (
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
OUT EFI_PHYSICAL_ADDRESS *Address
|
||||
)
|
||||
{
|
||||
ASSERT(Address != NULL);
|
||||
|
||||
*Address = mFlashNvStorageVariableBase;
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
/**
|
||||
The GetBlockSize() function retrieves the size of the requested
|
||||
block. It also returns the number of additional blocks with
|
||||
the identical size. The GetBlockSize() function is used to
|
||||
retrieve the block map (see EFI_FIRMWARE_VOLUME_HEADER).
|
||||
|
||||
|
||||
@param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
|
||||
|
||||
@param Lba Indicates the block for which to return the size.
|
||||
|
||||
@param BlockSize Pointer to a caller-allocated UINTN in which
|
||||
the size of the block is returned.
|
||||
|
||||
@param NumberOfBlocks Pointer to a caller-allocated UINTN in
|
||||
which the number of consecutive blocks,
|
||||
starting with Lba, is returned. All
|
||||
blocks in this range have a size of
|
||||
BlockSize.
|
||||
|
||||
|
||||
@retval EFI_SUCCESS The firmware volume base address was returned.
|
||||
|
||||
@retval EFI_INVALID_PARAMETER The requested LBA is out of range.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbGetBlockSize (
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
IN EFI_LBA Lba,
|
||||
OUT UINTN *BlockSize,
|
||||
OUT UINTN *NumberOfBlocks
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
SMMSTORE_INSTANCE *Instance;
|
||||
|
||||
Instance = INSTANCE_FROM_FVB_THIS(This);
|
||||
|
||||
DEBUG ((DEBUG_BLKIO, "FvbGetBlockSize(Lba=%ld, BlockSize=0x%x, LastBlock=%ld)\n", Lba, Instance->Media.BlockSize, Instance->Media.LastBlock));
|
||||
|
||||
if (Lba > Instance->Media.LastBlock) {
|
||||
DEBUG ((DEBUG_ERROR, "FvbGetBlockSize: ERROR - Parameter LBA %ld is beyond the last Lba (%ld).\n", Lba, Instance->Media.LastBlock));
|
||||
Status = EFI_INVALID_PARAMETER;
|
||||
} else {
|
||||
*BlockSize = (UINTN) Instance->Media.BlockSize;
|
||||
*NumberOfBlocks = (UINTN) (Instance->Media.LastBlock - Lba + 1);
|
||||
|
||||
DEBUG ((DEBUG_BLKIO, "FvbGetBlockSize: *BlockSize=0x%x, *NumberOfBlocks=0x%x.\n", *BlockSize, *NumberOfBlocks));
|
||||
|
||||
Status = EFI_SUCCESS;
|
||||
}
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
/**
|
||||
Reads the specified number of bytes into a buffer from the specified block.
|
||||
|
||||
The Read() function reads the requested number of bytes from the
|
||||
requested block and stores them in the provided buffer.
|
||||
Implementations should be mindful that the firmware volume
|
||||
might be in the ReadDisabled state. If it is in this state,
|
||||
the Read() function must return the status code
|
||||
EFI_ACCESS_DENIED without modifying the contents of the
|
||||
buffer. The Read() function must also prevent spanning block
|
||||
boundaries. If a read is requested that would span a block
|
||||
boundary, the read must read up to the boundary but not
|
||||
beyond. The output parameter NumBytes must be set to correctly
|
||||
indicate the number of bytes actually read. The caller must be
|
||||
aware that a read may be partially completed.
|
||||
|
||||
@param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
|
||||
|
||||
@param Lba The starting logical block index from which to read.
|
||||
|
||||
@param Offset Offset into the block at which to begin reading.
|
||||
|
||||
@param NumBytes Pointer to a UINTN.
|
||||
At entry, *NumBytes contains the total size of the buffer.
|
||||
At exit, *NumBytes contains the total number of bytes read.
|
||||
|
||||
@param Buffer Pointer to a caller-allocated buffer that will be used
|
||||
to hold the data that is read.
|
||||
|
||||
@retval EFI_SUCCESS The firmware volume was read successfully, and contents are
|
||||
in Buffer.
|
||||
|
||||
@retval EFI_BAD_BUFFER_SIZE Read attempted across an LBA boundary.
|
||||
On output, NumBytes contains the total number of bytes
|
||||
returned in Buffer.
|
||||
|
||||
@retval EFI_ACCESS_DENIED The firmware volume is in the ReadDisabled state.
|
||||
|
||||
@retval EFI_DEVICE_ERROR The block device is not functioning correctly and could not be read.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbRead (
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
IN EFI_LBA Lba,
|
||||
IN UINTN Offset,
|
||||
IN OUT UINTN *NumBytes,
|
||||
IN OUT UINT8 *Buffer
|
||||
)
|
||||
{
|
||||
UINTN BlockSize;
|
||||
SMMSTORE_INSTANCE *Instance;
|
||||
|
||||
Instance = INSTANCE_FROM_FVB_THIS(This);
|
||||
|
||||
DEBUG ((DEBUG_BLKIO, "FvbRead(Parameters: Lba=%ld, Offset=0x%x, *NumBytes=0x%x, Buffer @ 0x%08x)\n", Lba, Offset, *NumBytes, Buffer));
|
||||
|
||||
// Cache the block size to avoid de-referencing pointers all the time
|
||||
BlockSize = Instance->Media.BlockSize;
|
||||
|
||||
DEBUG ((DEBUG_BLKIO, "FvbRead: Check if (Offset=0x%x + NumBytes=0x%x) <= BlockSize=0x%x\n", Offset, *NumBytes, BlockSize ));
|
||||
|
||||
// The read must not span block boundaries.
|
||||
// We need to check each variable individually because adding two large values together overflows.
|
||||
if ((Offset >= BlockSize) ||
|
||||
(*NumBytes > BlockSize) ||
|
||||
((Offset + *NumBytes) > BlockSize)) {
|
||||
DEBUG ((DEBUG_ERROR, "FvbRead: ERROR - EFI_BAD_BUFFER_SIZE: (Offset=0x%x + NumBytes=0x%x) > BlockSize=0x%x\n", Offset, *NumBytes, BlockSize ));
|
||||
return EFI_BAD_BUFFER_SIZE;
|
||||
}
|
||||
|
||||
// We must have some bytes to read
|
||||
if (*NumBytes == 0) {
|
||||
return EFI_BAD_BUFFER_SIZE;
|
||||
}
|
||||
|
||||
return SMMStoreRead (Lba, Offset, NumBytes, Buffer);
|
||||
}
|
||||
|
||||
/**
|
||||
Writes the specified number of bytes from the input buffer to the block.
|
||||
|
||||
The Write() function writes the specified number of bytes from
|
||||
the provided buffer to the specified block and offset. If the
|
||||
firmware volume is sticky write, the caller must ensure that
|
||||
all the bits of the specified range to write are in the
|
||||
EFI_FVB_ERASE_POLARITY state before calling the Write()
|
||||
function, or else the result will be unpredictable. This
|
||||
unpredictability arises because, for a sticky-write firmware
|
||||
volume, a write may negate a bit in the EFI_FVB_ERASE_POLARITY
|
||||
state but cannot flip it back again. Before calling the
|
||||
Write() function, it is recommended for the caller to first call
|
||||
the EraseBlocks() function to erase the specified block to
|
||||
write. A block erase cycle will transition bits from the
|
||||
(NOT)EFI_FVB_ERASE_POLARITY state back to the
|
||||
EFI_FVB_ERASE_POLARITY state. Implementations should be
|
||||
mindful that the firmware volume might be in the WriteDisabled
|
||||
state. If it is in this state, the Write() function must
|
||||
return the status code EFI_ACCESS_DENIED without modifying the
|
||||
contents of the firmware volume. The Write() function must
|
||||
also prevent spanning block boundaries. If a write is
|
||||
requested that spans a block boundary, the write must store up
|
||||
to the boundary but not beyond. The output parameter NumBytes
|
||||
must be set to correctly indicate the number of bytes actually
|
||||
written. The caller must be aware that a write may be
|
||||
partially completed. All writes, partial or otherwise, must be
|
||||
fully flushed to the hardware before the Write() service
|
||||
returns.
|
||||
|
||||
@param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL instance.
|
||||
|
||||
@param Lba The starting logical block index to write to.
|
||||
|
||||
@param Offset Offset into the block at which to begin writing.
|
||||
|
||||
@param NumBytes The pointer to a UINTN.
|
||||
At entry, *NumBytes contains the total size of the buffer.
|
||||
At exit, *NumBytes contains the total number of bytes actually written.
|
||||
|
||||
@param Buffer The pointer to a caller-allocated buffer that contains the source for the write.
|
||||
|
||||
@retval EFI_SUCCESS The firmware volume was written successfully.
|
||||
|
||||
@retval EFI_BAD_BUFFER_SIZE The write was attempted across an LBA boundary.
|
||||
On output, NumBytes contains the total number of bytes
|
||||
actually written.
|
||||
|
||||
@retval EFI_ACCESS_DENIED The firmware volume is in the WriteDisabled state.
|
||||
|
||||
@retval EFI_DEVICE_ERROR The block device is malfunctioning and could not be written.
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbWrite (
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
IN EFI_LBA Lba,
|
||||
IN UINTN Offset,
|
||||
IN OUT UINTN *NumBytes,
|
||||
IN UINT8 *Buffer
|
||||
)
|
||||
{
|
||||
UINTN BlockSize;
|
||||
SMMSTORE_INSTANCE *Instance;
|
||||
|
||||
Instance = INSTANCE_FROM_FVB_THIS(This);
|
||||
|
||||
DEBUG ((DEBUG_BLKIO, "FvbWrite(Parameters: Lba=%ld, Offset=0x%x, *NumBytes=0x%x, Buffer @ 0x%08x)\n", Lba, Offset, *NumBytes, Buffer));
|
||||
|
||||
// Cache the block size to avoid de-referencing pointers all the time
|
||||
BlockSize = Instance->Media.BlockSize;
|
||||
|
||||
// The read must not span block boundaries.
|
||||
// We need to check each variable individually because adding two large values together overflows.
|
||||
if ((Offset >= BlockSize) ||
|
||||
(*NumBytes > BlockSize) ||
|
||||
((Offset + *NumBytes) > BlockSize)) {
|
||||
DEBUG ((DEBUG_ERROR, "FvbRead: ERROR - EFI_BAD_BUFFER_SIZE: (Offset=0x%x + NumBytes=0x%x) > BlockSize=0x%x\n", Offset, *NumBytes, BlockSize ));
|
||||
return EFI_BAD_BUFFER_SIZE;
|
||||
}
|
||||
|
||||
// We must have some bytes to read
|
||||
if (*NumBytes == 0) {
|
||||
return EFI_BAD_BUFFER_SIZE;
|
||||
}
|
||||
|
||||
return SMMStoreWrite (Lba, Offset, NumBytes, Buffer);
|
||||
}
|
||||
|
||||
/**
|
||||
Erases and initialises a firmware volume block.
|
||||
|
||||
The EraseBlocks() function erases one or more blocks as denoted
|
||||
by the variable argument list. The entire parameter list of
|
||||
blocks must be verified before erasing any blocks. If a block is
|
||||
requested that does not exist within the associated firmware
|
||||
volume (it has a larger index than the last block of the
|
||||
firmware volume), the EraseBlocks() function must return the
|
||||
status code EFI_INVALID_PARAMETER without modifying the contents
|
||||
of the firmware volume. Implementations should be mindful that
|
||||
the firmware volume might be in the WriteDisabled state. If it
|
||||
is in this state, the EraseBlocks() function must return the
|
||||
status code EFI_ACCESS_DENIED without modifying the contents of
|
||||
the firmware volume. All calls to EraseBlocks() must be fully
|
||||
flushed to the hardware before the EraseBlocks() service
|
||||
returns.
|
||||
|
||||
@param This Indicates the EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL
|
||||
instance.
|
||||
|
||||
@param ... The variable argument list is a list of tuples.
|
||||
Each tuple describes a range of LBAs to erase
|
||||
and consists of the following:
|
||||
- An EFI_LBA that indicates the starting LBA
|
||||
- A UINTN that indicates the number of blocks to erase.
|
||||
|
||||
The list is terminated with an EFI_LBA_LIST_TERMINATOR.
|
||||
For example, the following indicates that two ranges of blocks
|
||||
(5-7 and 10-11) are to be erased:
|
||||
EraseBlocks (This, 5, 3, 10, 2, EFI_LBA_LIST_TERMINATOR);
|
||||
|
||||
@retval EFI_SUCCESS The erase request successfully completed.
|
||||
|
||||
@retval EFI_ACCESS_DENIED The firmware volume is in the WriteDisabled state.
|
||||
|
||||
@retval EFI_DEVICE_ERROR The block device is not functioning correctly and could not be written.
|
||||
The firmware device may have been partially erased.
|
||||
|
||||
@retval EFI_INVALID_PARAMETER One or more of the LBAs listed in the variable argument list do
|
||||
not exist in the firmware volume.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
FvbEraseBlocks (
|
||||
IN CONST EFI_FIRMWARE_VOLUME_BLOCK2_PROTOCOL *This,
|
||||
...
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
VA_LIST Args;
|
||||
EFI_LBA StartingLba; // Lba from which we start erasing
|
||||
UINTN NumOfLba; // Number of Lba blocks to erase
|
||||
SMMSTORE_INSTANCE *Instance;
|
||||
|
||||
Instance = INSTANCE_FROM_FVB_THIS(This);
|
||||
|
||||
DEBUG ((DEBUG_BLKIO, "FvbEraseBlocks()\n"));
|
||||
|
||||
Status = EFI_SUCCESS;
|
||||
|
||||
// Detect WriteDisabled state
|
||||
if (Instance->Media.ReadOnly == TRUE) {
|
||||
// Firmware volume is in WriteDisabled state
|
||||
DEBUG ((DEBUG_ERROR, "FvbEraseBlocks: ERROR - Device is in WriteDisabled state.\n"));
|
||||
return EFI_ACCESS_DENIED;
|
||||
}
|
||||
|
||||
// Before erasing, check the entire list of parameters to ensure all specified blocks are valid
|
||||
|
||||
VA_START (Args, This);
|
||||
do {
|
||||
// Get the Lba from which we start erasing
|
||||
StartingLba = VA_ARG (Args, EFI_LBA);
|
||||
|
||||
// Have we reached the end of the list?
|
||||
if (StartingLba == EFI_LBA_LIST_TERMINATOR) {
|
||||
//Exit the while loop
|
||||
break;
|
||||
}
|
||||
|
||||
// How many Lba blocks are we requested to erase?
|
||||
NumOfLba = VA_ARG (Args, UINTN);
|
||||
|
||||
// All blocks must be within range
|
||||
DEBUG ((
|
||||
DEBUG_BLKIO,
|
||||
"FvbEraseBlocks: Check if: ( StartingLba=%ld + NumOfLba=%Lu - 1 ) > LastBlock=%ld.\n",
|
||||
StartingLba,
|
||||
(UINT64)NumOfLba,
|
||||
Instance->Media.LastBlock
|
||||
));
|
||||
if ((NumOfLba == 0) || ((StartingLba + NumOfLba - 1) > Instance->Media.LastBlock)) {
|
||||
VA_END (Args);
|
||||
DEBUG ((DEBUG_ERROR, "FvbEraseBlocks: ERROR - Lba range goes past the last Lba.\n"));
|
||||
Status = EFI_INVALID_PARAMETER;
|
||||
goto EXIT;
|
||||
}
|
||||
} while (TRUE);
|
||||
VA_END (Args);
|
||||
|
||||
//
|
||||
// To get here, all must be ok, so start erasing
|
||||
//
|
||||
VA_START (Args, This);
|
||||
do {
|
||||
// Get the Lba from which we start erasing
|
||||
StartingLba = VA_ARG (Args, EFI_LBA);
|
||||
|
||||
// Have we reached the end of the list?
|
||||
if (StartingLba == EFI_LBA_LIST_TERMINATOR) {
|
||||
// Exit the while loop
|
||||
break;
|
||||
}
|
||||
|
||||
// How many Lba blocks are we requested to erase?
|
||||
NumOfLba = VA_ARG (Args, UINTN);
|
||||
|
||||
// Go through each one and erase it
|
||||
while (NumOfLba > 0) {
|
||||
// Erase it
|
||||
DEBUG ((DEBUG_BLKIO, "FvbEraseBlocks: Erasing Lba=%ld\n", StartingLba));
|
||||
Status = SMMStoreEraseBlock (StartingLba);
|
||||
if (EFI_ERROR(Status)) {
|
||||
VA_END (Args);
|
||||
Status = EFI_DEVICE_ERROR;
|
||||
goto EXIT;
|
||||
}
|
||||
|
||||
// Move to the next Lba
|
||||
StartingLba++;
|
||||
NumOfLba--;
|
||||
}
|
||||
} while (TRUE);
|
||||
VA_END (Args);
|
||||
|
||||
EXIT:
|
||||
return Status;
|
||||
}
|
||||
|
||||
/**
|
||||
Fixup internal data so that EFI can be call in virtual mode.
|
||||
Call the passed in Child Notify event and convert any pointers in
|
||||
lib to virtual mode.
|
||||
|
||||
@param[in] Event The Event that is being processed
|
||||
@param[in] Context Event Context
|
||||
**/
|
||||
VOID
|
||||
EFIAPI
|
||||
FvbVirtualNotifyEvent (
|
||||
IN EFI_EVENT Event,
|
||||
IN VOID *Context
|
||||
)
|
||||
{
|
||||
EfiConvertPointer (0x0, (VOID**)&mFlashNvStorageVariableBase);
|
||||
return;
|
||||
}
|
||||
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
SMMStoreFvbInitialize (
|
||||
IN SMMSTORE_INSTANCE* Instance
|
||||
)
|
||||
{
|
||||
EFI_STATUS Status;
|
||||
UINT32 FvbNumLba;
|
||||
EFI_BOOT_MODE BootMode;
|
||||
|
||||
DEBUG((DEBUG_BLKIO,"NorFlashFvbInitialize\n"));
|
||||
ASSERT((Instance != NULL));
|
||||
|
||||
mFlashNvStorageVariableBase = PcdGet32 (PcdFlashNvStorageVariableBase);
|
||||
|
||||
BootMode = GetBootModeHob ();
|
||||
if (BootMode == BOOT_WITH_DEFAULT_SETTINGS) {
|
||||
Status = EFI_INVALID_PARAMETER;
|
||||
} else {
|
||||
// Determine if there is a valid header at the beginning of the NorFlash
|
||||
Status = ValidateFvHeader (Instance);
|
||||
}
|
||||
|
||||
// Install the Default FVB header if required
|
||||
if (EFI_ERROR(Status)) {
|
||||
// There is no valid header, so time to install one.
|
||||
DEBUG ((DEBUG_INFO, "%a: The FVB Header is not valid.\n", __FUNCTION__));
|
||||
DEBUG ((DEBUG_INFO, "%a: Installing a correct one for this volume.\n",
|
||||
__FUNCTION__));
|
||||
|
||||
// Erase all the NorFlash that is reserved for variable storage
|
||||
FvbNumLba = (PcdGet32(PcdFlashNvStorageVariableSize) +
|
||||
PcdGet32(PcdFlashNvStorageFtwWorkingSize) +
|
||||
PcdGet32(PcdFlashNvStorageFtwSpareSize)) / Instance->Media.BlockSize;
|
||||
|
||||
Status = FvbEraseBlocks (&Instance->FvbProtocol, (EFI_LBA)0, FvbNumLba, EFI_LBA_LIST_TERMINATOR);
|
||||
if (EFI_ERROR(Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
// Install all appropriate headers
|
||||
Status = InitializeFvAndVariableStoreHeaders (Instance);
|
||||
if (EFI_ERROR(Status)) {
|
||||
return Status;
|
||||
}
|
||||
} else {
|
||||
DEBUG((DEBUG_INFO, "%a: FVB header is valid\n", __FUNCTION__));
|
||||
}
|
||||
|
||||
//
|
||||
// The driver implementing the variable read service can now be dispatched;
|
||||
// the varstore headers are in place.
|
||||
//
|
||||
Status = gBS->InstallProtocolInterface (
|
||||
&gImageHandle,
|
||||
&gEdkiiNvVarStoreFormattedGuid,
|
||||
EFI_NATIVE_INTERFACE,
|
||||
NULL
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
//
|
||||
// Register for the virtual address change event
|
||||
//
|
||||
Status = gBS->CreateEventEx (
|
||||
EVT_NOTIFY_SIGNAL,
|
||||
TPL_NOTIFY,
|
||||
FvbVirtualNotifyEvent,
|
||||
NULL,
|
||||
&gEfiEventVirtualAddressChangeGuid,
|
||||
&mFvbVirtualAddrChangeEvent
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
return Status;
|
||||
}
|
@ -7,6 +7,7 @@
|
||||
|
||||
**/
|
||||
#include "BlSupportDxe.h"
|
||||
#include <Guid/TpmInstance.h>
|
||||
|
||||
/**
|
||||
Reserve MMIO/IO resource in GCD
|
||||
@ -105,6 +106,7 @@ BlDxeEntryPoint (
|
||||
EFI_HOB_GUID_TYPE *GuidHob;
|
||||
EFI_PEI_GRAPHICS_INFO_HOB *GfxInfo;
|
||||
ACPI_BOARD_INFO *AcpiBoardInfo;
|
||||
UINTN Size;
|
||||
|
||||
Status = EFI_SUCCESS;
|
||||
//
|
||||
@ -140,6 +142,27 @@ BlDxeEntryPoint (
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
Status = PcdSet64S (PcdPciExpressBaseSize, AcpiBoardInfo->PcieBaseSize);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
|
||||
if (AcpiBoardInfo->TPM20Present)
|
||||
{
|
||||
Size = sizeof (gEfiTpmDeviceInstanceTpm20DtpmGuid);
|
||||
Status = PcdSetPtrS (
|
||||
PcdTpmInstanceGuid,
|
||||
&Size,
|
||||
&gEfiTpmDeviceInstanceTpm20DtpmGuid
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
}
|
||||
else if (AcpiBoardInfo->TPM12Present)
|
||||
{
|
||||
Size = sizeof (gEfiTpmDeviceInstanceTpm12Guid);
|
||||
Status = PcdSetPtrS (
|
||||
PcdTpmInstanceGuid,
|
||||
&Size,
|
||||
&gEfiTpmDeviceInstanceTpm12Guid
|
||||
);
|
||||
ASSERT_EFI_ERROR (Status);
|
||||
}
|
||||
}
|
||||
|
||||
return EFI_SUCCESS;
|
||||
|
@ -31,6 +31,7 @@
|
||||
MdePkg/MdePkg.dec
|
||||
MdeModulePkg/MdeModulePkg.dec
|
||||
UefiPayloadPkg/UefiPayloadPkg.dec
|
||||
SecurityPkg/SecurityPkg.dec
|
||||
|
||||
[LibraryClasses]
|
||||
UefiDriverEntryPoint
|
||||
@ -45,6 +46,8 @@
|
||||
gUefiSystemTableInfoGuid
|
||||
gUefiAcpiBoardInfoGuid
|
||||
gEfiGraphicsInfoHobGuid
|
||||
gEfiTpmDeviceInstanceTpm20DtpmGuid ## SOMETIMES_CONSUMES
|
||||
gEfiTpmDeviceInstanceTpm12Guid ## SOMETIMES_CONSUMES
|
||||
|
||||
[Pcd]
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdVideoHorizontalResolution
|
||||
@ -53,6 +56,7 @@
|
||||
gEfiMdeModulePkgTokenSpaceGuid.PcdSetupVideoVerticalResolution
|
||||
gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress
|
||||
gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseSize
|
||||
gEfiSecurityPkgTokenSpaceGuid.PcdTpmInstanceGuid ## SOMETIMES_PRODUCES
|
||||
|
||||
[Depex]
|
||||
TRUE
|
||||
|
@ -236,6 +236,19 @@ struct cb_cbmem_tab {
|
||||
UINT64 cbmem_tab;
|
||||
};
|
||||
|
||||
#define CB_TAG_SMMSTOREV2 0x0039
|
||||
struct cb_smmstorev2 {
|
||||
UINT32 tag;
|
||||
UINT32 size;
|
||||
UINT32 num_blocks; /* Number of writeable blocks in SMM */
|
||||
UINT32 block_size; /* Size of a block in byte. Default: 64 KiB */
|
||||
UINT32 mmap_addr; /* MMIO address of the store for read only access */
|
||||
UINT32 com_buffer; /* Physical address of the communication buffer */
|
||||
UINT32 com_buffer_size; /* Size of the communication buffer in byte */
|
||||
UINT8 apm_cmd; /* The command byte to write to the APM I/O port */
|
||||
UINT8 unused[3]; /* Set to zero */
|
||||
};
|
||||
|
||||
/* Helpful macros */
|
||||
|
||||
#define MEM_RANGE_COUNT(_rec) \
|
||||
@ -245,5 +258,30 @@ struct cb_cbmem_tab {
|
||||
(void *)(((UINT8 *) (_rec)) + sizeof(*(_rec)) \
|
||||
+ (sizeof((_rec)->map[0]) * (_idx)))
|
||||
|
||||
#define CB_TAG_TPM_PPI_HANDOFF 0x003a
|
||||
|
||||
enum lb_tmp_ppi_tpm_version {
|
||||
LB_TPM_VERSION_UNSPEC = 0,
|
||||
LB_TPM_VERSION_TPM_VERSION_1_2,
|
||||
LB_TPM_VERSION_TPM_VERSION_2,
|
||||
};
|
||||
|
||||
/*
|
||||
* Handoff buffer for TPM Physical Presence Interface.
|
||||
* * ppi_address Pointer to PPI buffer shared with ACPI
|
||||
* The layout of the buffer matches the QEMU virtual memory device
|
||||
* that is generated by QEMU.
|
||||
* See files 'hw/i386/acpi-build.c' and 'include/hw/acpi/tpm.h'
|
||||
* for details.
|
||||
* * tpm_version TPM version: 1 for TPM1.2, 2 for TPM2.0
|
||||
* * ppi_version BCD encoded version of TPM PPI interface
|
||||
*/
|
||||
struct cb_tpm_physical_presence {
|
||||
UINT32 tag;
|
||||
UINT32 size;
|
||||
UINT32 ppi_address; /* Address of ACPI PPI communication buffer */
|
||||
UINT8 tpm_version; /* 1: TPM1.2, 2: TPM2.0 */
|
||||
UINT8 ppi_version; /* BCD encoded */
|
||||
};
|
||||
|
||||
#endif // _COREBOOT_PEI_H_INCLUDED_
|
||||
|
@ -25,6 +25,8 @@ typedef struct {
|
||||
UINT64 ResetRegAddress;
|
||||
UINT64 PcieBaseAddress;
|
||||
UINT64 PcieBaseSize;
|
||||
UINT8 TPM20Present;
|
||||
UINT8 TPM12Present;
|
||||
} ACPI_BOARD_INFO;
|
||||
|
||||
#endif
|
||||
|
46
UefiPayloadPkg/Include/Guid/PciExpressBaseAddress.h
Normal file
46
UefiPayloadPkg/Include/Guid/PciExpressBaseAddress.h
Normal file
@ -0,0 +1,46 @@
|
||||
/** @file
|
||||
|
||||
Copyright (c) 2006, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
Module Name:
|
||||
|
||||
PciExpressBaseAddress.h
|
||||
|
||||
Abstract:
|
||||
|
||||
|
||||
GUIDs used for PciExpress Base Address
|
||||
|
||||
**/
|
||||
|
||||
#ifndef _EFI_PCI_EXPRESS_BASE_ADDRESS_H_
|
||||
#define _EFI_PCI_EXPRESS_BASE_ADDRESS_H_
|
||||
|
||||
#define EFI_PCI_EXPRESS_BASE_ADDRESS_GUID \
|
||||
{ \
|
||||
0x3677d529, 0x326f, 0x4603, {0xa9, 0x26, 0xea, 0xac, 0xe0, 0x1d, 0xcb, 0xb0} \
|
||||
}
|
||||
|
||||
//
|
||||
// Following structure defines PCI Express Base Address information.
|
||||
// This information is platform specific, and built into hob in PEI phase.
|
||||
// It can be consumed by PEI PCI driver and DXE PCI driver.
|
||||
//
|
||||
#pragma pack(1)
|
||||
typedef struct _EFI_PCI_EXPRESS_BASE_ADDRESS_INFORMATION {
|
||||
UINT32 HostBridgeNumber;
|
||||
UINT32 RootBridgeNumber;
|
||||
UINT64 PciExpressBaseAddress;
|
||||
} EFI_PCI_EXPRESS_BASE_ADDRESS_INFORMATION;
|
||||
#pragma pack()
|
||||
|
||||
extern EFI_GUID gEfiPciExpressBaseAddressGuid;
|
||||
|
||||
#endif
|
41
UefiPayloadPkg/Include/Guid/PciOptionRomTable.h
Normal file
41
UefiPayloadPkg/Include/Guid/PciOptionRomTable.h
Normal file
@ -0,0 +1,41 @@
|
||||
/** @file
|
||||
GUID and data structure used to describe the list of PCI Option ROMs present in a system.
|
||||
|
||||
Copyright (c) 2006, Intel Corporation. All rights reserved.<BR>
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
which accompanies this distribution. The full text of the license may be found at
|
||||
http://opensource.org/licenses/bsd-license.php
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
**/
|
||||
|
||||
#ifndef __PCI_OPTION_ROM_TABLE_GUID_H_
|
||||
#define __PCI_OPTION_ROM_TABLE_GUID_H_
|
||||
|
||||
#define EFI_PCI_OPTION_ROM_TABLE_GUID \
|
||||
{ 0x7462660f, 0x1cbd, 0x48da, {0xad, 0x11, 0x91, 0x71, 0x79, 0x13, 0x83, 0x1c } }
|
||||
|
||||
extern EFI_GUID gEfiPciOptionRomTableGuid;
|
||||
|
||||
typedef struct {
|
||||
EFI_PHYSICAL_ADDRESS RomAddress;
|
||||
EFI_MEMORY_TYPE MemoryType;
|
||||
UINT32 RomLength;
|
||||
UINT32 Seg;
|
||||
UINT8 Bus;
|
||||
UINT8 Dev;
|
||||
UINT8 Func;
|
||||
BOOLEAN ExecutedLegacyBiosImage;
|
||||
BOOLEAN DontLoadEfiRom;
|
||||
} EFI_PCI_OPTION_ROM_DESCRIPTOR;
|
||||
|
||||
typedef struct {
|
||||
UINT64 PciOptionRomCount;
|
||||
EFI_PCI_OPTION_ROM_DESCRIPTOR *PciOptionRomDescriptors;
|
||||
} EFI_PCI_OPTION_ROM_TABLE;
|
||||
|
||||
#endif // __PCI_OPTION_ROM_TABLE_GUID_H_
|
||||
|
27
UefiPayloadPkg/Include/Guid/SMMSTOREInfoGuid.h
Normal file
27
UefiPayloadPkg/Include/Guid/SMMSTOREInfoGuid.h
Normal file
@ -0,0 +1,27 @@
|
||||
/** @file
|
||||
This file defines the hob structure for system tables like ACPI, SMBIOS tables.
|
||||
|
||||
Copyright (c) 2020, 9elements Agency GmbH<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
||||
**/
|
||||
|
||||
#ifndef __SMMSTORE_GUID_H__
|
||||
#define __SMMSTORE_GUID_H__
|
||||
|
||||
///
|
||||
/// System Table Information GUID
|
||||
///
|
||||
extern EFI_GUID gEfiSMMSTOREInfoHobGuid;
|
||||
|
||||
typedef struct {
|
||||
UINT64 ComBuffer;
|
||||
UINT32 ComBufferSize;
|
||||
UINT32 NumBlocks;
|
||||
UINT32 BlockSize;
|
||||
UINT64 MmioAddress;
|
||||
UINT8 ApmCmd;
|
||||
UINT8 Reserved0[3];
|
||||
} SMMSTORE_INFO;
|
||||
|
||||
#endif
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user